diff --git a/CODE/DISARM-STIX2/__pycache__/main.cpython-38.pyc b/CODE/DISARM-STIX2/__pycache__/main.cpython-38.pyc index c9218d4..9d69f22 100644 Binary files a/CODE/DISARM-STIX2/__pycache__/main.cpython-38.pyc and b/CODE/DISARM-STIX2/__pycache__/main.cpython-38.pyc differ diff --git a/CODE/DISARM-STIX2/helpers/__pycache__/file.cpython-38.pyc b/CODE/DISARM-STIX2/helpers/__pycache__/file.cpython-38.pyc index 4269d58..1ae0c91 100644 Binary files a/CODE/DISARM-STIX2/helpers/__pycache__/file.cpython-38.pyc and b/CODE/DISARM-STIX2/helpers/__pycache__/file.cpython-38.pyc differ diff --git a/CODE/DISARM-STIX2/helpers/__pycache__/xlsx.cpython-38.pyc b/CODE/DISARM-STIX2/helpers/__pycache__/xlsx.cpython-38.pyc index c578263..ee2f8bd 100644 Binary files a/CODE/DISARM-STIX2/helpers/__pycache__/xlsx.cpython-38.pyc and b/CODE/DISARM-STIX2/helpers/__pycache__/xlsx.cpython-38.pyc differ diff --git a/CODE/DISARM-STIX2/objects/__pycache__/bundle.cpython-38.pyc b/CODE/DISARM-STIX2/objects/__pycache__/bundle.cpython-38.pyc index f10adac..192ba6d 100644 Binary files a/CODE/DISARM-STIX2/objects/__pycache__/bundle.cpython-38.pyc and b/CODE/DISARM-STIX2/objects/__pycache__/bundle.cpython-38.pyc differ diff --git a/CODE/DISARM-STIX2/objects/__pycache__/identity.cpython-38.pyc b/CODE/DISARM-STIX2/objects/__pycache__/identity.cpython-38.pyc index c3305a6..9793499 100644 Binary files a/CODE/DISARM-STIX2/objects/__pycache__/identity.cpython-38.pyc and b/CODE/DISARM-STIX2/objects/__pycache__/identity.cpython-38.pyc differ diff --git a/CODE/DISARM-STIX2/objects/__pycache__/marking_definition.cpython-38.pyc b/CODE/DISARM-STIX2/objects/__pycache__/marking_definition.cpython-38.pyc index 93332e3..36d54f4 100644 Binary files a/CODE/DISARM-STIX2/objects/__pycache__/marking_definition.cpython-38.pyc and b/CODE/DISARM-STIX2/objects/__pycache__/marking_definition.cpython-38.pyc differ diff --git a/CODE/DISARM-STIX2/objects/__pycache__/matrix.cpython-38.pyc b/CODE/DISARM-STIX2/objects/__pycache__/matrix.cpython-38.pyc index e3e3ab5..0515650 100644 Binary files a/CODE/DISARM-STIX2/objects/__pycache__/matrix.cpython-38.pyc and b/CODE/DISARM-STIX2/objects/__pycache__/matrix.cpython-38.pyc differ diff --git a/CODE/DISARM-STIX2/objects/__pycache__/tactic.cpython-38.pyc b/CODE/DISARM-STIX2/objects/__pycache__/tactic.cpython-38.pyc index 875ef10..2ad39eb 100644 Binary files a/CODE/DISARM-STIX2/objects/__pycache__/tactic.cpython-38.pyc and b/CODE/DISARM-STIX2/objects/__pycache__/tactic.cpython-38.pyc differ diff --git a/CODE/DISARM-STIX2/objects/__pycache__/technique.cpython-38.pyc b/CODE/DISARM-STIX2/objects/__pycache__/technique.cpython-38.pyc index bf6e811..4462689 100644 Binary files a/CODE/DISARM-STIX2/objects/__pycache__/technique.cpython-38.pyc and b/CODE/DISARM-STIX2/objects/__pycache__/technique.cpython-38.pyc differ diff --git a/CODE/__pycache__/generate_DISARM_pages.cpython-38.pyc b/CODE/__pycache__/generate_DISARM_pages.cpython-38.pyc index 6704961..bac3d12 100644 Binary files a/CODE/__pycache__/generate_DISARM_pages.cpython-38.pyc and b/CODE/__pycache__/generate_DISARM_pages.cpython-38.pyc differ diff --git a/generated_files/DISARM_STIX/DISARM.json b/generated_files/DISARM_STIX/DISARM.json index 0799069..2429b28 100644 --- a/generated_files/DISARM_STIX/DISARM.json +++ b/generated_files/DISARM_STIX/DISARM.json @@ -1,15 +1,15 @@ { "type": "bundle", - "id": "bundle--a2bcc7f6-d52b-4227-a7f1-1cdd84161c9e", + "id": "bundle--72f0cf92-0ac6-4673-aa14-82f1684e4de3", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "x-mitre-tactic--45968fd4-4fdb-4ba2-82e1-f5e5c148e325", - "created_by_ref": "identity--125833cb-53bf-4bae-b876-1f1380db32f9", - "created": "2022-06-29T15:07:39.598443Z", - "modified": "2022-06-29T15:07:39.598443Z", - "name": "Strategic Planning", + "id": "x-mitre-tactic--ca848c76-3e2e-4059-a61f-dce4180b4710", + "created_by_ref": "identity--579368bd-8440-4f8e-96c2-ad508b73a5e9", + "created": "2022-07-01T03:29:17.091145Z", + "modified": "2022-07-01T03:29:17.091145Z", + "name": "Plan Strategy", "description": "Define the desired end state, i.e. the set of required conditions that defines achievement of all objectives.", "external_references": [ { @@ -19,19 +19,19 @@ } ], "object_marking_refs": [ - "marking-definition--57742fd1-338e-4321-9899-e3d5dca7b965" + "marking-definition--d12db0e6-fa29-41c5-b43e-a46d0618d61c" ], - "x_mitre_shortname": "strategic-planning" + "x_mitre_shortname": "plan-strategy" }, { "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "x-mitre-tactic--2f02c1ff-9e62-469c-a8bf-d9a6b1cc7917", - "created_by_ref": "identity--1bb5fb95-92d8-4177-bd6f-69d39102c166", - "created": "2022-06-29T15:07:39.59933Z", - "modified": "2022-06-29T15:07:39.59933Z", - "name": "Objective Planning", - "description": "Set clearly defined, measurable, and achievable objectives. Achieving objectives ties execution of tactical tasks to reaching the desired end state. There are four primary considerations:\n- Each desired effect should link directly to one or more objectives\n- The effect should be measurable\n- The objective statement should not specify the way and means of accomplishment\n- The effect should be distinguishable from the objective it supports as a condition for success, not as another objective or task.", + "id": "x-mitre-tactic--eec7c49a-35c0-4ed2-9161-f7dba316a609", + "created_by_ref": "identity--7b955472-f8e6-4b82-8c31-300defa2ff1d", + "created": "2022-07-01T03:29:17.091699Z", + "modified": "2022-07-01T03:29:17.091699Z", + "name": "Plan Objectives", + "description": "Set clearly defined, measurable, and achievable objectives. Achieving objectives ties execution of tactical tasks to reaching the desired end state. There are four primary considerations: \n- Each desired effect should link directly to one or more objectives \n- The effect should be measurable \n- The objective statement should not specify the way and means of accomplishment \n- The effect should be distinguishable from the objective it supports as a condition for success, not as another objective or task.", "external_references": [ { "source_name": "DISARM", @@ -40,81 +40,18 @@ } ], "object_marking_refs": [ - "marking-definition--2ec6f56d-d375-41a5-8130-9b6ebf4a86dc" + "marking-definition--efbc7fb0-9eca-4e7c-b2e7-c22aea404a22" ], - "x_mitre_shortname": "objective-planning" + "x_mitre_shortname": "plan-objectives" }, { "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "x-mitre-tactic--49b9b288-58bb-41b8-b2b7-570e10025264", - "created_by_ref": "identity--0b41447d-bea6-40d3-9ac8-8a04b664b04c", - "created": "2022-06-29T15:07:39.600239Z", - "modified": "2022-06-29T15:07:39.600239Z", - "name": "Conduct Center of Gravity Analysis", - "description": "Recon/research to identify \"the source of power that provides moral or physical strength, freedom of action, or will to act.\" Thus, the center of gravity is usually seen as the \"source of strength\". Includes demographic and network analysis of communities", - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA13.md", - "external_id": "TA13" - } - ], - "object_marking_refs": [ - "marking-definition--f4e8ae1c-deab-4507-80fd-fecc81a150cc" - ], - "x_mitre_shortname": "conduct-center-of-gravity-analysis" - }, - { - "type": "x-mitre-tactic", - "spec_version": "2.1", - "id": "x-mitre-tactic--f2d0efbf-0f86-419b-917b-2f3dc904094d", - "created_by_ref": "identity--6099b19d-e04a-4c37-bda2-98d74fb89c39", - "created": "2022-06-29T15:07:39.601668Z", - "modified": "2022-06-29T15:07:39.601668Z", - "name": "Develop People", - "description": "Develop online and offline users and agents, including automated personas", - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA03.md", - "external_id": "TA03" - } - ], - "object_marking_refs": [ - "marking-definition--1114b012-3734-403b-b0b5-cd9b05671a62" - ], - "x_mitre_shortname": "develop-people" - }, - { - "type": "x-mitre-tactic", - "spec_version": "2.1", - "id": "x-mitre-tactic--a9cc9713-f33b-44a8-868b-c59950406f76", - "created_by_ref": "identity--6dae4715-664b-454e-82fb-96d8bfcc300e", - "created": "2022-06-29T15:07:39.602545Z", - "modified": "2022-06-29T15:07:39.602545Z", - "name": "Develop Networks", - "description": "Develop online and offline communities and transmission methods and cultivate assets and unwitting agents", - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA04.md", - "external_id": "TA04" - } - ], - "object_marking_refs": [ - "marking-definition--61f73ca8-1f50-4cd2-8950-14b91614578a" - ], - "x_mitre_shortname": "develop-networks" - }, - { - "type": "x-mitre-tactic", - "spec_version": "2.1", - "id": "x-mitre-tactic--6c6c13f5-aa72-42e5-a9d2-4700306c353e", - "created_by_ref": "identity--5ed012d0-1601-486c-8d8d-7ed4484b5b3f", - "created": "2022-06-29T15:07:39.60333Z", - "modified": "2022-06-29T15:07:39.60333Z", - "name": "Microtargeting", + "id": "x-mitre-tactic--e749a24c-8362-4fed-ba26-51e56b37b439", + "created_by_ref": "identity--a8a35a10-0c6d-48ab-9642-0d968a0e6579", + "created": "2022-07-01T03:29:17.092239Z", + "modified": "2022-07-01T03:29:17.092239Z", + "name": "Microtarget", "description": "Target very specific populations of people", "external_references": [ { @@ -124,19 +61,19 @@ } ], "object_marking_refs": [ - "marking-definition--4bce6287-e6b3-4eb3-9f72-c517e91fa686" + "marking-definition--9e9c4039-2734-451e-9eae-14bfee5150c5" ], - "x_mitre_shortname": "microtargeting" + "x_mitre_shortname": "microtarget" }, { "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "x-mitre-tactic--5c04a4d3-dd32-458b-952e-1e05f2861cbd", - "created_by_ref": "identity--d9d725ce-a097-4c35-a468-04828dfdfd3a", - "created": "2022-06-29T15:07:39.604105Z", - "modified": "2022-06-29T15:07:39.604105Z", + "id": "x-mitre-tactic--4348a49d-d21a-4915-a512-ba1accaa8cd9", + "created_by_ref": "identity--ebae25a4-b31b-40c4-b26f-c603911318b6", + "created": "2022-07-01T03:29:17.092712Z", + "modified": "2022-07-01T03:29:17.092712Z", "name": "Develop Content", - "description": "Create and acquire content used in incident", + "description": "TBD", "external_references": [ { "source_name": "DISARM", @@ -145,19 +82,19 @@ } ], "object_marking_refs": [ - "marking-definition--6c534bfb-7b1b-4af3-be06-6855f71c8d0a" + "marking-definition--f6a72729-0ae7-401c-b0c0-8f97fa40e86e" ], "x_mitre_shortname": "develop-content" }, { "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "x-mitre-tactic--ddb9dd2f-6a39-46e8-9b3c-a25c12cef614", - "created_by_ref": "identity--afcafb94-dc2c-45da-b40a-6afdbf8e536f", - "created": "2022-06-29T15:07:39.604873Z", - "modified": "2022-06-29T15:07:39.604873Z", - "name": "Channel Selection", - "description": "Set up specific delivery, amplification and manipulation channels for incident, including channels to attack. Each channel serves as an atomic surface (test bed) location/site for adversary to hide/conceal the work/content that goes into setting up for this channel and/or other specific platforms. Contributes to building out a connected ecosystem where this channel can operate as part of a whole campaign/incident", + "id": "x-mitre-tactic--7c9b3fa5-50f8-4fab-acc3-f984b7290cd7", + "created_by_ref": "identity--68919beb-b367-4f0d-b473-7c1ef2f7cc41", + "created": "2022-07-01T03:29:17.093161Z", + "modified": "2022-07-01T03:29:17.093161Z", + "name": "Select Channels and Affordances", + "description": "Selecting platforms and affordances assesses which online or offline platforms and their associated affordances maximize an influence operation\u2019s ability to reach its target audience. To select the most appropriate platform(s), an operation may assess the technological affordances including platform algorithms, terms of service, permitted content types, or other attributes that determine platform usability and accessibility. Selecting platforms includes both choosing platforms on which the operation will publish its own content and platforms on which the operation will attempt to restrict adversarial content.", "external_references": [ { "source_name": "DISARM", @@ -166,19 +103,19 @@ } ], "object_marking_refs": [ - "marking-definition--19f570c1-18da-4e67-a25d-2dfebe78f672" + "marking-definition--a3ba48a6-8927-4416-8923-070e7b66d99b" ], - "x_mitre_shortname": "channel-selection" + "x_mitre_shortname": "select-channels-and-affordances" }, { "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "x-mitre-tactic--ede1dc9b-6afa-46d1-a42c-6b3e791bc1eb", - "created_by_ref": "identity--5db0a7c4-6a1b-4bf4-96fe-903e83aeffa8", - "created": "2022-06-29T15:07:39.60579Z", - "modified": "2022-06-29T15:07:39.60579Z", - "name": "Pump Priming", - "description": "Release content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing. ", + "id": "x-mitre-tactic--f59414c8-2d4d-4d9e-8d88-fe8a339270d1", + "created_by_ref": "identity--957e8ee3-66c0-4c39-81ab-bc8f197dc060", + "created": "2022-07-01T03:29:17.093615Z", + "modified": "2022-07-01T03:29:17.093615Z", + "name": "Conduct Pump Priming", + "description": "Release content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing. ", "external_references": [ { "source_name": "DISARM", @@ -187,19 +124,19 @@ } ], "object_marking_refs": [ - "marking-definition--d2c8701a-10d8-44ed-813f-816287d4338e" + "marking-definition--8f98688d-973b-4d80-a055-eef509cafa92" ], - "x_mitre_shortname": "pump-priming" + "x_mitre_shortname": "conduct-pump-priming" }, { "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "x-mitre-tactic--66b91148-79b6-472f-b48b-5c74113088dc", - "created_by_ref": "identity--fa3bc483-b617-451e-9d4b-0319b384e007", - "created": "2022-06-29T15:07:39.606564Z", - "modified": "2022-06-29T15:07:39.606564Z", - "name": "Exposure", - "description": "Release content to general public or push to larger population", + "id": "x-mitre-tactic--717ccb01-df67-48a8-b6ec-9551272a4ff4", + "created_by_ref": "identity--89b633d0-6026-4f5a-b937-96c110081e4b", + "created": "2022-07-01T03:29:17.094056Z", + "modified": "2022-07-01T03:29:17.094056Z", + "name": "Deliver Content", + "description": "Release content to general public or larger population", "external_references": [ { "source_name": "DISARM", @@ -208,19 +145,19 @@ } ], "object_marking_refs": [ - "marking-definition--18be7d67-99d2-445e-82e4-cb2a2d2001c5" + "marking-definition--7b7d7a4a-d135-432c-b8e8-d758ec6aaabe" ], - "x_mitre_shortname": "exposure" + "x_mitre_shortname": "deliver-content" }, { "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "x-mitre-tactic--81feb109-6d02-468e-bd47-006ce9d9aafa", - "created_by_ref": "identity--38b488f5-bebd-4549-b299-b48a025ab7a7", - "created": "2022-06-29T15:07:39.607327Z", - "modified": "2022-06-29T15:07:39.607327Z", + "id": "x-mitre-tactic--b2ad03fa-b162-4161-b864-344f9cb69ad3", + "created_by_ref": "identity--ef082dc6-c5d4-4f34-839a-afb81676681d", + "created": "2022-07-01T03:29:17.094502Z", + "modified": "2022-07-01T03:29:17.094502Z", "name": "Drive Offline Activity", - "description": "Move incident into offline world", + "description": "Move incident/campaign from online to offline. Encouraging users to move from the platform on which they initially viewed operation content and engage in the physical information space or offline world. This may include operation-aligned rallies or protests, radio, newspaper, or billboards. An influence operation may drive to physical forums to diversify its information channels and facilitate spaces where the target audience can engage with both operation content and like-minded individuals offline. ", "external_references": [ { "source_name": "DISARM", @@ -229,19 +166,19 @@ } ], "object_marking_refs": [ - "marking-definition--c71c8982-494c-4f13-b20c-5ed4357852f0" + "marking-definition--6c20ec26-a68f-4ea4-87e7-0f4c3d1dc466" ], "x_mitre_shortname": "drive-offline-activity" }, { "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "x-mitre-tactic--898251e6-a030-4ff1-8037-2c4b49e85ed3", - "created_by_ref": "identity--4372f1ab-ec3d-4c3c-9c9f-2388733f6690", - "created": "2022-06-29T15:07:39.60849Z", - "modified": "2022-06-29T15:07:39.60849Z", - "name": "Persistence", - "description": "Keep incident 'alive', beyond the incident creators' efforts", + "id": "x-mitre-tactic--efddae0c-df65-48be-a7a4-067237d8a528", + "created_by_ref": "identity--2d057bc4-00f4-42ed-b56d-f441f58c0224", + "created": "2022-07-01T03:29:17.0951Z", + "modified": "2022-07-01T03:29:17.0951Z", + "name": "Persist in the Information Environment", + "description": "Persist in the Information Space refers to taking measures that allow an operation to maintain its presence and avoid takedown by an external entity. Techniques in Persist in the Information Space help campaigns operate without detection and appear legitimate to the target audience and platform monitoring services. Influence operations on social media often persist online by varying the type of information assets and platforms used throughout the campaign.", "external_references": [ { "source_name": "DISARM", @@ -250,19 +187,19 @@ } ], "object_marking_refs": [ - "marking-definition--674862c3-7265-4282-bd8c-3a0d22c4c4c0" + "marking-definition--7e8d9bd0-001f-45d2-aa7f-a57b18f3df70" ], - "x_mitre_shortname": "persistence" + "x_mitre_shortname": "persist-in-the-information-environment" }, { "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "x-mitre-tactic--6a8a5578-8e24-4599-b5ce-556f207927c7", - "created_by_ref": "identity--a8fe2534-40b8-415a-b4fb-b11fdda48cc9", - "created": "2022-06-29T15:07:39.60928Z", - "modified": "2022-06-29T15:07:39.60928Z", - "name": "Measure Effectiveness", - "description": "Measure effectiveness of incident, for use in planning future events", + "id": "x-mitre-tactic--96ec7676-22a8-40f8-91f9-2b770fec3a78", + "created_by_ref": "identity--2390bb84-1e20-4e06-beb8-f61631529f6f", + "created": "2022-07-01T03:29:17.095552Z", + "modified": "2022-07-01T03:29:17.095552Z", + "name": "Assess Effectiveness", + "description": "Assess effectiveness of action, for use in future plans ", "external_references": [ { "source_name": "DISARM", @@ -271,56 +208,149 @@ } ], "object_marking_refs": [ - "marking-definition--dc36d4e3-df17-435b-a9eb-edaabf732e61" + "marking-definition--8b21940e-5b88-4d9f-9708-d69f7b827cf4" ], - "x_mitre_shortname": "measure-effectiveness" + "x_mitre_shortname": "assess-effectiveness" }, { - "type": "attack-pattern", + "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "attack-pattern--84a2d44a-8820-41ed-ac79-c5aa7a8f8309", - "created_by_ref": "identity--36185e59-28d9-4668-bc6f-e1ee4a79cf41", - "created": "2022-06-29T15:07:39.610695Z", - "modified": "2022-06-29T15:07:39.610695Z", - "name": "5Ds (dismiss, distort, distract, dismay, divide)", - "description": "TA01", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "strategic-planning" - } - ], + "id": "x-mitre-tactic--10b904db-7568-4a50-bf6f-9541f3b01924", + "created_by_ref": "identity--2a9898a9-5d27-4f77-90d6-81cb400c7dc0", + "created": "2022-07-01T03:29:17.096002Z", + "modified": "2022-07-01T03:29:17.096002Z", + "name": "Target Audience Analysis", + "description": "Identifying and analyzing the target audience examines target audience member locations, political affiliations, financial situations, and other attributes that an influence operation may incorporate into its messaging strategy. During this tactic, influence operations may also identify existing similarities and differences between target audience members to unite like groups and divide opposing groups. Identifying and analyzing target audience members allows influence operations to tailor operation strategy and content to their analysis. ", "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0001.md", - "external_id": "T0001" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA13.md", + "external_id": "TA13" } ], "object_marking_refs": [ - "marking-definition--1733e05c-8340-4ffe-a371-0816092f6ace" + "marking-definition--32769669-4b13-4c4b-89c6-e877a011fa61" ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" + "x_mitre_shortname": "target-audience-analysis" + }, + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--977b0d14-c42a-4f3e-badb-fdabb9781544", + "created_by_ref": "identity--4fdd4e7b-3b3e-425e-847f-dc5f200fb7cf", + "created": "2022-07-01T03:29:17.096467Z", + "modified": "2022-07-01T03:29:17.096467Z", + "name": "Develop Narratives", + "description": "The promotion of beneficial master narratives is perhaps the most effective method for achieving long-term strategic narrative dominance. From a \"\"whole of society\"\" perspective the promotion of the society's core master narratives should occupy a central strategic role. From a misinformation campaign / cognitive security perpectve the tactics around master narratives center more precisely on the day-to-day promotion and reinforcement of this messaging. In other words, beneficial, high-coverage master narratives are a central strategic goal and their promotion constitutes an ongoing tactical struggle carried out at a whole-of-society level. Tactically, their promotion covers a broad spectrum of activities both on- and offline.", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA14.md", + "external_id": "TA14" + } ], - "x_mitre_version": "1,0" + "object_marking_refs": [ + "marking-definition--369927eb-a5a4-4672-a0d0-88d758feed9d" + ], + "x_mitre_shortname": "develop-narratives" + }, + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--5d068e30-413a-4465-b51b-8e9fc1e18b1e", + "created_by_ref": "identity--e6b10b3f-81f4-4f5d-a61b-6ba6d32a927c", + "created": "2022-07-01T03:29:17.096916Z", + "modified": "2022-07-01T03:29:17.096916Z", + "name": "Establish Social Assets", + "description": "Establishing information assets generates messaging tools, including social media accounts, operation personnel, and organizations, including directly and indirectly managed assets. For assets under their direct control, the operation can add, change, or remove these assets at will. \nEstablishing information assets allows an influence operation to promote messaging directly to the target audience without navigating through external entities. Many online influence operations create or compromise social media accounts as a primary vector of information dissemination.", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA15.md", + "external_id": "TA15" + } + ], + "object_marking_refs": [ + "marking-definition--67f09a98-95d6-47d0-87b8-7499972e7685" + ], + "x_mitre_shortname": "establish-social-assets" + }, + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--60087ffe-9390-4baf-8e93-20b3f075da8e", + "created_by_ref": "identity--3c5779ae-e3d8-4248-abd3-fd7bf16fe311", + "created": "2022-07-01T03:29:17.097362Z", + "modified": "2022-07-01T03:29:17.097362Z", + "name": "Establish Legitimacy", + "description": "TBD", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA16.md", + "external_id": "TA16" + } + ], + "object_marking_refs": [ + "marking-definition--8309d1c8-87a1-4323-967b-7216161d998d" + ], + "x_mitre_shortname": "establish-legitimacy" + }, + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--c4e65fa5-4f02-4075-b26f-07c0d07badaa", + "created_by_ref": "identity--9ce26eb7-7607-4333-b84b-6b0e2cd074a3", + "created": "2022-07-01T03:29:17.097809Z", + "modified": "2022-07-01T03:29:17.097809Z", + "name": "Maximize Exposure", + "description": "Maximize exposure of the target audience to incident/campaign content via flooding, amplifying, and cross-posting.", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA17.md", + "external_id": "TA17" + } + ], + "object_marking_refs": [ + "marking-definition--75ce5799-1b91-4be6-8427-d41dc3c3b8b2" + ], + "x_mitre_shortname": "maximize-exposure" + }, + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--2fad8829-108a-4d6a-8135-6bc3bf74a770", + "created_by_ref": "identity--62fae23f-94ca-47ca-a703-4e203716b2f5", + "created": "2022-07-01T03:29:17.098423Z", + "modified": "2022-07-01T03:29:17.098423Z", + "name": "Drive Online Harms", + "description": "Actions taken by an influence operation to harm their opponents in online spaces through harassment, suppression, releasing private information, and controlling the information space through offensive cyberspace operations. ", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA18.md", + "external_id": "TA18" + } + ], + "object_marking_refs": [ + "marking-definition--885c611a-01f1-4456-9415-81dacb2de148" + ], + "x_mitre_shortname": "drive-online-harms" }, { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--b7d38923-ba1b-4510-b82e-be675c8ea67f", - "created_by_ref": "identity--d2aea7f2-2399-42fa-966c-7965cccd334f", - "created": "2022-06-29T15:07:39.611653Z", - "modified": "2022-06-29T15:07:39.611653Z", + "id": "attack-pattern--83124e9f-4981-445c-aa20-b7a3990c18ab", + "created_by_ref": "identity--e5631f8e-4441-44b0-98de-44cef0359a06", + "created": "2022-07-01T03:29:17.099228Z", + "modified": "2022-07-01T03:29:17.099228Z", "name": "Facilitate State Propaganda", - "description": "TA01", + "description": "TA02", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "strategic-planning" + "phase_name": "plan-objectives" } ], "external_references": [ @@ -331,7 +361,7 @@ } ], "object_marking_refs": [ - "marking-definition--8e92cb65-7303-4b12-9378-48449e853d08" + "marking-definition--27285727-7410-4083-a6b1-94d53ac3486a" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -344,16 +374,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--a0e45e50-f5c8-4a62-99f8-ac66d384c8dc", - "created_by_ref": "identity--0fd268e7-8d8f-43de-b2bf-0fc25740704e", - "created": "2022-06-29T15:07:39.6125Z", - "modified": "2022-06-29T15:07:39.6125Z", + "id": "attack-pattern--9164934b-19e2-4516-a792-5d5f08b06d34", + "created_by_ref": "identity--396f6b80-8694-4493-9336-c4037a980f18", + "created": "2022-07-01T03:29:17.099805Z", + "modified": "2022-07-01T03:29:17.099805Z", "name": "Leverage Existing Narratives", - "description": "TA01", + "description": "TA14", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "strategic-planning" + "phase_name": "develop-narratives" } ], "external_references": [ @@ -364,7 +394,7 @@ } ], "object_marking_refs": [ - "marking-definition--86ff77e1-75f8-4c01-80cb-de61dcbcf86a" + "marking-definition--745557fb-5156-4f7d-bfe4-184c9c076280" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -377,16 +407,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--fac68697-f3ca-4638-b00f-fecc56636459", - "created_by_ref": "identity--85232727-a150-4760-aa83-3b1bd115b3e6", - "created": "2022-06-29T15:07:39.61337Z", - "modified": "2022-06-29T15:07:39.61337Z", - "name": "Devise Competing Narratives", - "description": "TA01", + "id": "attack-pattern--fd260e6a-7b36-4c30-9a12-29745ec85672", + "created_by_ref": "identity--19e9d8d8-0dd2-42aa-a34e-17adc2be525f", + "created": "2022-07-01T03:29:17.100339Z", + "modified": "2022-07-01T03:29:17.100339Z", + "name": "Develop Competing Narratives", + "description": "TA14", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "strategic-planning" + "phase_name": "develop-narratives" } ], "external_references": [ @@ -397,7 +427,7 @@ } ], "object_marking_refs": [ - "marking-definition--25a3d95a-aa85-45cd-b06e-6ecade362f98" + "marking-definition--4ea9cf26-90ed-4b44-8a0d-43af22149baa" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -410,49 +440,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--f00125d7-2219-4a89-8219-69e4c76b085b", - "created_by_ref": "identity--1ae777f7-6354-4a8e-8809-44380eb3ec9f", - "created": "2022-06-29T15:07:39.614322Z", - "modified": "2022-06-29T15:07:39.614322Z", - "name": "Develop Narrative Concepts", - "description": "TA02", + "id": "attack-pattern--10d0a71b-b7b0-4b59-812b-6a9f859094b1", + "created_by_ref": "identity--949ff029-9578-4d91-8428-1f38178d59b2", + "created": "2022-07-01T03:29:17.100806Z", + "modified": "2022-07-01T03:29:17.100806Z", + "name": "Create Inauthentic Social Media Pages and Groups", + "description": "TA15", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "objective-planning" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0006.md", - "external_id": "T0006" - } - ], - "object_marking_refs": [ - "marking-definition--7d2a1f26-30e1-42a1-8d6c-19bdeb0a012b" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--3075bb6b-39fc-4320-8bd9-1b2a1429928a", - "created_by_ref": "identity--46595ce7-1bfe-4523-8102-88996c6e005a", - "created": "2022-06-29T15:07:39.615253Z", - "modified": "2022-06-29T15:07:39.615253Z", - "name": "Create fake Social Media Profiles / Pages / Groups", - "description": "TA03", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "develop-people" + "phase_name": "establish-social-assets" } ], "external_references": [ @@ -463,7 +460,7 @@ } ], "object_marking_refs": [ - "marking-definition--26898b49-7e32-471b-8ffa-1e01b3060d44" + "marking-definition--d545e516-526f-47bc-a99e-3aa1cac2287a" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -476,49 +473,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--f3d091e2-e76c-4512-a0fd-04522c0e4519", - "created_by_ref": "identity--874dbe85-12c8-46ef-b7d6-64f01e032269", - "created": "2022-06-29T15:07:39.616083Z", - "modified": "2022-06-29T15:07:39.616083Z", - "name": "Create fake or imposter news sites", - "description": "TA03", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "develop-people" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0008.md", - "external_id": "T0008" - } - ], - "object_marking_refs": [ - "marking-definition--9ce37768-60f5-4ce8-afa9-5c5b12af93e0" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--e7bf113f-c6a4-4e72-ba77-bc654347ec2d", - "created_by_ref": "identity--b481df8f-c7e0-4bfa-97fb-15363803de41", - "created": "2022-06-29T15:07:39.617032Z", - "modified": "2022-06-29T15:07:39.617032Z", + "id": "attack-pattern--4e5ff619-85fd-4d36-a3c4-9a400c8cbfe5", + "created_by_ref": "identity--53e04b17-377e-45d2-b176-3294849546cc", + "created": "2022-07-01T03:29:17.101267Z", + "modified": "2022-07-01T03:29:17.101267Z", "name": "Create fake experts", - "description": "TA03", + "description": "TA16", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-people" + "phase_name": "establish-legitimacy" } ], "external_references": [ @@ -529,7 +493,7 @@ } ], "object_marking_refs": [ - "marking-definition--b5a12b0e-1562-4288-b8ae-43eb18200bf1" + "marking-definition--b0ce9dfe-3859-4529-b404-babf37771f31" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -542,16 +506,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--55a9a479-b834-4c81-9239-f75a4324b22f", - "created_by_ref": "identity--2b7d9f37-5747-43df-a1b2-043d15d716f6", - "created": "2022-06-29T15:07:39.617863Z", - "modified": "2022-06-29T15:07:39.617863Z", + "id": "attack-pattern--e3011cc8-6ecc-4cbd-8827-15feef09bfc5", + "created_by_ref": "identity--e2679b1b-d851-427f-8c2b-0c8269f6156e", + "created": "2022-07-01T03:29:17.101731Z", + "modified": "2022-07-01T03:29:17.101731Z", "name": "Cultivate ignorant agents", - "description": "TA04", + "description": "TA15", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-networks" + "phase_name": "establish-social-assets" } ], "external_references": [ @@ -562,7 +526,7 @@ } ], "object_marking_refs": [ - "marking-definition--7a6c579f-0f76-4993-8822-c68202c1cb19" + "marking-definition--65e1b90e-5ed8-45b5-8831-99b8a6f56cfa" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -575,16 +539,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--d8f9fdb1-cdf0-48b3-842b-67a7f8e8c1c7", - "created_by_ref": "identity--e9fbc051-1c09-4c86-a61e-8c0d2a4bad77", - "created": "2022-06-29T15:07:39.618689Z", - "modified": "2022-06-29T15:07:39.618689Z", - "name": "Compromise legitimate account", - "description": "TA04", + "id": "attack-pattern--ce2ffeb8-df39-425b-992e-57d0b11174ca", + "created_by_ref": "identity--2a6fb1d5-2fd2-46be-bf0a-2b7735791652", + "created": "2022-07-01T03:29:17.102189Z", + "modified": "2022-07-01T03:29:17.102189Z", + "name": "Compromise legitimate accounts", + "description": "TA16", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-networks" + "phase_name": "establish-legitimacy" } ], "external_references": [ @@ -595,7 +559,7 @@ } ], "object_marking_refs": [ - "marking-definition--0d732177-3798-4fa8-92c8-20eae733bdce" + "marking-definition--c64ec293-b524-48c2-8e90-1359a1052d21" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -608,49 +572,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--841e1310-50ac-44c6-b5b8-53e1a66b6347", - "created_by_ref": "identity--7dce5432-6435-4489-ad71-88841216f4f4", - "created": "2022-06-29T15:07:39.619506Z", - "modified": "2022-06-29T15:07:39.619506Z", - "name": "Use concealment", - "description": "TA04", + "id": "attack-pattern--1397f207-ad1b-4398-9d06-ed36393d53fa", + "created_by_ref": "identity--e7a9ac1f-d1b0-4a3f-af61-e546ca3ae445", + "created": "2022-07-01T03:29:17.102645Z", + "modified": "2022-07-01T03:29:17.102645Z", + "name": "Create inauthentic websites", + "description": "TA15", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-networks" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0012.md", - "external_id": "T0012" - } - ], - "object_marking_refs": [ - "marking-definition--f124dc4e-34a1-4178-8675-6fb7dba683ce" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--cde7dc89-06fc-4b39-8f28-953ca75817b6", - "created_by_ref": "identity--819423c4-fd86-4ade-b7ce-0ddc03fc43e9", - "created": "2022-06-29T15:07:39.620326Z", - "modified": "2022-06-29T15:07:39.620326Z", - "name": "Create fake websites", - "description": "TA04", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "develop-networks" + "phase_name": "establish-social-assets" } ], "external_references": [ @@ -661,7 +592,7 @@ } ], "object_marking_refs": [ - "marking-definition--8b11efad-8eb5-4f7b-95d4-462fb516d4e5" + "marking-definition--c91f7963-b220-47db-8707-c034998735ce" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -674,16 +605,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--9c13610c-f066-478e-b8e8-013133e12b90", - "created_by_ref": "identity--f440cf48-92fb-4282-a1dd-537fbffd6c24", - "created": "2022-06-29T15:07:39.62148Z", - "modified": "2022-06-29T15:07:39.62148Z", + "id": "attack-pattern--8ca19a73-b5e2-4715-bb61-7f27777e14b1", + "created_by_ref": "identity--efb531aa-da43-4bd3-b767-47d2fdfb3c3f", + "created": "2022-07-01T03:29:17.10311Z", + "modified": "2022-07-01T03:29:17.10311Z", "name": "Prepare fundraising campaigns", - "description": "TA04", + "description": "TA15", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-networks" + "phase_name": "establish-social-assets" } ], "external_references": [ @@ -694,7 +625,7 @@ } ], "object_marking_refs": [ - "marking-definition--0d0758c5-7c67-4b99-a691-161650d220c7" + "marking-definition--5e84c2ef-d66e-4d32-b59b-524af19cdcce" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -707,16 +638,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--3359ff9e-860e-46e0-9d87-11f47b2ae40d", - "created_by_ref": "identity--aceeab73-113b-4587-bf35-2795fa74fdc9", - "created": "2022-06-29T15:07:39.622326Z", - "modified": "2022-06-29T15:07:39.622326Z", - "name": "Create hashtags", - "description": "TA04", + "id": "attack-pattern--0f8410d6-0ede-4e4f-8b70-d8a6821d25b0", + "created_by_ref": "identity--ba81db1f-626f-46c3-bb99-f88a11819af7", + "created": "2022-07-01T03:29:17.103569Z", + "modified": "2022-07-01T03:29:17.103569Z", + "name": "Create hashtags and search artifacts", + "description": "TA06", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-networks" + "phase_name": "develop-content" } ], "external_references": [ @@ -727,7 +658,7 @@ } ], "object_marking_refs": [ - "marking-definition--85e1c7bf-fe4a-4c4e-bd0c-08cae90a8e47" + "marking-definition--e25c36d4-b84a-48e3-9d85-8cd8b333f755" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -740,16 +671,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--789aae94-1312-4aab-b415-3320bf01b20c", - "created_by_ref": "identity--3f37ec47-1cf2-46c9-bc9a-335f456ebd73", - "created": "2022-06-29T15:07:39.62325Z", - "modified": "2022-06-29T15:07:39.62325Z", - "name": "Clickbait", + "id": "attack-pattern--77789dad-9435-4866-a083-4dbc0a456727", + "created_by_ref": "identity--6dbc3bb6-bfb1-4814-a642-e84b19de7b32", + "created": "2022-07-01T03:29:17.104029Z", + "modified": "2022-07-01T03:29:17.104029Z", + "name": "Create Clickbait", "description": "TA05", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "microtargeting" + "phase_name": "microtarget" } ], "external_references": [ @@ -760,7 +691,7 @@ } ], "object_marking_refs": [ - "marking-definition--75a460d4-730b-480f-8945-2a756876c5a5" + "marking-definition--9df75d1a-d0a1-4531-b34d-f16b54d677be" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -773,16 +704,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--cd48ce8e-e0e4-4c95-ab9d-13389b50b039", - "created_by_ref": "identity--223a5089-a1c2-4ad6-9043-a8f21293c430", - "created": "2022-06-29T15:07:39.624076Z", - "modified": "2022-06-29T15:07:39.624076Z", - "name": "Conduct Fundraising Campaigns", - "description": "TA05", + "id": "attack-pattern--86e913cc-f722-4f2e-a2df-150ade9d0726", + "created_by_ref": "identity--778425bc-e2fc-4e82-9f10-74e98082be43", + "created": "2022-07-01T03:29:17.104489Z", + "modified": "2022-07-01T03:29:17.104489Z", + "name": "Conduct fundraising", + "description": "TA10", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "microtargeting" + "phase_name": "drive-offline-activity" } ], "external_references": [ @@ -793,7 +724,7 @@ } ], "object_marking_refs": [ - "marking-definition--bbc7ec0c-6dfc-4981-b955-6bbfa5d84dae" + "marking-definition--6e5bb1e1-f5ac-42b6-b078-fe3292fa9eb1" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -806,16 +737,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--9f7a1615-b64e-4598-8d4b-325b5cd885e7", - "created_by_ref": "identity--19d68843-3bfb-43e5-9181-da54e704d1f1", - "created": "2022-06-29T15:07:39.625256Z", - "modified": "2022-06-29T15:07:39.625256Z", - "name": "Purchase advertisements", + "id": "attack-pattern--e46945d5-536e-4d6f-9a46-0f9b6007112d", + "created_by_ref": "identity--2b797c80-0029-4570-8ec4-d8968e972294", + "created": "2022-07-01T03:29:17.104944Z", + "modified": "2022-07-01T03:29:17.104944Z", + "name": "Purchase Targeted Advertisements", "description": "TA05", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "microtargeting" + "phase_name": "microtarget" } ], "external_references": [ @@ -826,7 +757,7 @@ } ], "object_marking_refs": [ - "marking-definition--d3a79065-5187-4ea6-a7b1-b6cbbe4c2c74" + "marking-definition--1cc4f334-81f1-4aa5-94a5-cc8ecdecb207" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -839,10 +770,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--efb40471-8eff-4649-8809-e590a2662d10", - "created_by_ref": "identity--5898fcca-b1dd-4a89-8fdf-aa85bf426db3", - "created": "2022-06-29T15:07:39.62625Z", - "modified": "2022-06-29T15:07:39.62625Z", + "id": "attack-pattern--33acdd6d-93eb-4aaf-9e00-4691814bcc88", + "created_by_ref": "identity--c67ea4eb-798d-43ad-b13e-b10aedfd81a2", + "created": "2022-07-01T03:29:17.105397Z", + "modified": "2022-07-01T03:29:17.105397Z", "name": "Generate information pollution", "description": "TA06", "kill_chain_phases": [ @@ -859,7 +790,7 @@ } ], "object_marking_refs": [ - "marking-definition--a608bd3b-cb2c-4b23-8f4c-a9de74e01498" + "marking-definition--c157d07b-43b6-4b2f-aee8-a335fef9a052" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -872,16 +803,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--30280325-59ca-4e5e-adef-8f5cc26bcdb7", - "created_by_ref": "identity--262785cd-a416-4796-b07f-a370de05f5e1", - "created": "2022-06-29T15:07:39.627103Z", - "modified": "2022-06-29T15:07:39.627103Z", + "id": "attack-pattern--adee13dd-8bd5-4738-91b1-3997cf7bd994", + "created_by_ref": "identity--6edc8264-41c1-46ae-8a0e-6090e4211029", + "created": "2022-07-01T03:29:17.10585Z", + "modified": "2022-07-01T03:29:17.10585Z", "name": "Trial content", - "description": "TA06", + "description": "TA08", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-content" + "phase_name": "conduct-pump-priming" } ], "external_references": [ @@ -892,7 +823,7 @@ } ], "object_marking_refs": [ - "marking-definition--bb9d31d5-7bcf-404b-b61c-55a15d828423" + "marking-definition--f4cdda6a-56d0-45ea-84b2-3fc6aa953f27" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -905,49 +836,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--11c32299-cfec-447f-9f78-935315141c50", - "created_by_ref": "identity--c0bd9b54-2596-4b51-b1be-dd884dec665b", - "created": "2022-06-29T15:07:39.627943Z", - "modified": "2022-06-29T15:07:39.627943Z", - "name": "Memes", - "description": "TA06", + "id": "attack-pattern--b725fa2e-779d-44e5-a0f4-4724d14b6deb", + "created_by_ref": "identity--ec724bf6-a7e7-4496-8a1e-fa9e4cf5c8a4", + "created": "2022-07-01T03:29:17.106312Z", + "modified": "2022-07-01T03:29:17.106312Z", + "name": "Leverage Conspiracy Theory Narratives", + "description": "TA14", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-content" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0021.md", - "external_id": "T0021" - } - ], - "object_marking_refs": [ - "marking-definition--d85a7f9d-b853-4268-8265-e41ce7590c4e" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--e9884739-ea1d-4c73-bf20-4c98709a6f28", - "created_by_ref": "identity--9e3b644d-4304-4922-820b-1b132631811a", - "created": "2022-06-29T15:07:39.629147Z", - "modified": "2022-06-29T15:07:39.629147Z", - "name": "Conspiracy narratives", - "description": "TA06", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "develop-content" + "phase_name": "develop-narratives" } ], "external_references": [ @@ -958,7 +856,7 @@ } ], "object_marking_refs": [ - "marking-definition--f5b9bb2a-3b58-4078-b122-3d8c5e124e0d" + "marking-definition--8d89ab9d-c93f-4f24-9f64-c117bbc52cf0" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -971,10 +869,10 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--9c80a414-47c7-4871-8874-8f8ea4584f3d", - "created_by_ref": "identity--5e9bd661-f645-4170-b4c3-f554f1fe5856", - "created": "2022-06-29T15:07:39.630148Z", - "modified": "2022-06-29T15:07:39.630148Z", + "id": "attack-pattern--66064bf0-d00b-490e-b6f2-3e07baf1a830", + "created_by_ref": "identity--b33bfbf5-ecf8-4423-bbb2-4b53d30975e9", + "created": "2022-07-01T03:29:17.106773Z", + "modified": "2022-07-01T03:29:17.106773Z", "name": "Distort facts", "description": "TA06", "kill_chain_phases": [ @@ -991,7 +889,7 @@ } ], "object_marking_refs": [ - "marking-definition--d9a09fda-4b37-4fcd-91ab-b684c3fa55cd" + "marking-definition--e34375e0-40a4-44ad-8528-8ad89576aa4f" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -1004,181 +902,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--fb3dae2e-a565-4774-8471-fca6fed9d430", - "created_by_ref": "identity--dc984f43-985c-47fc-8c77-9aea0e6aa070", - "created": "2022-06-29T15:07:39.631008Z", - "modified": "2022-06-29T15:07:39.631008Z", - "name": "Create fake videos and images", - "description": "TA06", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "develop-content" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0024.md", - "external_id": "T0024" - } - ], - "object_marking_refs": [ - "marking-definition--1586c8a4-d65b-4610-bdb5-9b325222311f" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--f458d4eb-87c9-4c24-bfa1-f4a9467edf61", - "created_by_ref": "identity--66685a31-cdb4-4d34-8bbb-4a47ca520901", - "created": "2022-06-29T15:07:39.631864Z", - "modified": "2022-06-29T15:07:39.631864Z", - "name": "Leak altered documents", - "description": "TA06", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "develop-content" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0025.md", - "external_id": "T0025" - } - ], - "object_marking_refs": [ - "marking-definition--1f0dd35c-a866-49e4-828b-1b0e8ce8f4d5" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--cf006959-4d30-4dad-a7fa-22daadc54815", - "created_by_ref": "identity--a1ff5fb1-dbfe-4a40-b1cf-66e724081929", - "created": "2022-06-29T15:07:39.632662Z", - "modified": "2022-06-29T15:07:39.632662Z", - "name": "Create pseudoscientific or disingenuous research", - "description": "TA06", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "develop-content" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0026.md", - "external_id": "T0026" - } - ], - "object_marking_refs": [ - "marking-definition--a700a9ee-fadb-47dd-a8b7-cef31d7bf29f" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--4692326b-924e-4b2f-9eca-3ecd9d7ec1be", - "created_by_ref": "identity--a1c6522c-1e7e-4772-928e-a3320546fbd7", - "created": "2022-06-29T15:07:39.633485Z", - "modified": "2022-06-29T15:07:39.633485Z", - "name": "Adapt existing narratives", - "description": "TA06", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "develop-content" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0027.md", - "external_id": "T0027" - } - ], - "object_marking_refs": [ - "marking-definition--01a4145b-c9f6-46e4-bdb9-4978f47b8868" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--bd05490e-2878-4429-8733-11ba701979d3", - "created_by_ref": "identity--1ee45a95-6500-45a3-8ef1-0f02c522e97b", - "created": "2022-06-29T15:07:39.634308Z", - "modified": "2022-06-29T15:07:39.634308Z", - "name": "Create competing narratives", - "description": "TA06", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "develop-content" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0028.md", - "external_id": "T0028" - } - ], - "object_marking_refs": [ - "marking-definition--2b2ce021-2309-4394-9096-87853a7c8294" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--413bb66c-1ecf-4e9d-bb68-3ea2161d449b", - "created_by_ref": "identity--6d959eae-cd5a-4520-9323-608b5f4794c8", - "created": "2022-06-29T15:07:39.635202Z", - "modified": "2022-06-29T15:07:39.635202Z", - "name": "Manipulate online polls", + "id": "attack-pattern--5cc3ca96-5655-4238-8d76-9e212bbae9ec", + "created_by_ref": "identity--58d52260-ef12-4246-ad63-ad69b0360e98", + "created": "2022-07-01T03:29:17.107233Z", + "modified": "2022-07-01T03:29:17.107233Z", + "name": "Online polls", "description": "TA07", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" + "phase_name": "select-channels-and-affordances" } ], "external_references": [ @@ -1189,7 +922,7 @@ } ], "object_marking_refs": [ - "marking-definition--946301e5-d900-4e74-89ec-2686d4b7718d" + "marking-definition--3da6cf9d-1ce4-4f2e-b6d4-1923b709345d" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -1202,324 +935,27 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--d1d9fbc5-1a0d-4c54-9284-b4254b2aedcb", - "created_by_ref": "identity--e26ac50e-fe21-4258-acc0-c5fd2fb2c003", - "created": "2022-06-29T15:07:39.636177Z", - "modified": "2022-06-29T15:07:39.636177Z", - "name": "Backstop personas", - "description": "TA07", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0030.md", - "external_id": "T0030" - } - ], - "object_marking_refs": [ - "marking-definition--3ec1d89b-ac1c-4390-ad55-c105b4086200" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--955864ba-e10a-4456-8349-2bc7858bc990", - "created_by_ref": "identity--bf9e05c5-5314-49db-b2e1-8f22fd1ffe9e", - "created": "2022-06-29T15:07:39.637017Z", - "modified": "2022-06-29T15:07:39.637017Z", - "name": "YouTube", - "description": "TA07", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0031.md", - "external_id": "T0031" - } - ], - "object_marking_refs": [ - "marking-definition--9888dac6-7b56-436b-b276-ea7774d33d22" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--90cf47b9-d7a8-4305-b5d2-43c96a27033a", - "created_by_ref": "identity--e89f1e4c-34c5-488b-b2f8-ef37beb05b7a", - "created": "2022-06-29T15:07:39.637902Z", - "modified": "2022-06-29T15:07:39.637902Z", - "name": "Reddit", - "description": "TA07", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0032.md", - "external_id": "T0032" - } - ], - "object_marking_refs": [ - "marking-definition--42473975-0d38-41eb-82c1-0b8c7a87bd2f" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--82e41ffb-af93-4beb-b45e-32ad1c2172ff", - "created_by_ref": "identity--1ea15f55-3cfb-4a5b-904d-1ba50bc281dc", - "created": "2022-06-29T15:07:39.63883Z", - "modified": "2022-06-29T15:07:39.63883Z", - "name": "Instagram", - "description": "TA07", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0033.md", - "external_id": "T0033" - } - ], - "object_marking_refs": [ - "marking-definition--5447d252-3be0-4121-9f30-86470453af86" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--44fb71ec-858f-4392-aa7e-308876d787ca", - "created_by_ref": "identity--fc7750ea-d603-4def-b797-c2a1ce6ecd39", - "created": "2022-06-29T15:07:39.639769Z", - "modified": "2022-06-29T15:07:39.639769Z", - "name": "LinkedIn", - "description": "TA07", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0034.md", - "external_id": "T0034" - } - ], - "object_marking_refs": [ - "marking-definition--fdae8056-6642-4a17-9fe0-6cfaa22621b9" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--fd760a8e-d115-45ee-9399-6fb9d98eabba", - "created_by_ref": "identity--ed36f4ba-651d-41f6-b60e-4a341b7ce4e3", - "created": "2022-06-29T15:07:39.640692Z", - "modified": "2022-06-29T15:07:39.640692Z", - "name": "Pinterest", - "description": "TA07", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0035.md", - "external_id": "T0035" - } - ], - "object_marking_refs": [ - "marking-definition--b3423c1e-00b2-46bd-8b74-902ddfe3b405" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--e871e99b-abc1-4b1c-b00d-51c247d7d259", - "created_by_ref": "identity--4131f25c-10a7-4492-b1dd-b0170979fcdc", - "created": "2022-06-29T15:07:39.641583Z", - "modified": "2022-06-29T15:07:39.641583Z", - "name": "WhatsApp", - "description": "TA07", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0036.md", - "external_id": "T0036" - } - ], - "object_marking_refs": [ - "marking-definition--b6ccac56-44ae-4198-8096-386ddd276815" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--7b39572f-5feb-4cb5-87f0-acfce31b5628", - "created_by_ref": "identity--e7ec42e4-3697-4b94-a995-56ffa9abd4a5", - "created": "2022-06-29T15:07:39.642437Z", - "modified": "2022-06-29T15:07:39.642437Z", - "name": "Facebook", - "description": "TA07", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0037.md", - "external_id": "T0037" - } - ], - "object_marking_refs": [ - "marking-definition--c3d60b27-9ab5-4502-a47e-81c7dec8d054" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--96852c01-94f7-465f-9d58-acc33148b15c", - "created_by_ref": "identity--e5ac1460-477f-4765-be1e-40f8e6882e5c", - "created": "2022-06-29T15:07:39.643889Z", - "modified": "2022-06-29T15:07:39.643889Z", - "name": "Twitter", - "description": "TA07", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0038.md", - "external_id": "T0038" - } - ], - "object_marking_refs": [ - "marking-definition--1cc171db-ad4b-4ebf-8b4a-0299906b7d09" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--81201f8f-d4af-43d2-b871-1452b99ec7ea", - "created_by_ref": "identity--2f672425-274a-4338-8cf9-836a758e7d3d", - "created": "2022-06-29T15:07:39.64475Z", - "modified": "2022-06-29T15:07:39.64475Z", + "id": "attack-pattern--eb6d2cf6-e0cd-446b-a1f3-2cd7b8f20162", + "created_by_ref": "identity--10d05fd9-175e-477e-b416-1e4d9cbab465", + "created": "2022-07-01T03:29:17.107697Z", + "modified": "2022-07-01T03:29:17.107697Z", "name": "Bait legitimate influencers", "description": "TA08", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "pump-priming" + "phase_name": "conduct-pump-priming" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0039.md", - "external_id": "T0039" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0039 .md", + "external_id": "T0039 " } ], "object_marking_refs": [ - "marking-definition--8bfd8806-fd70-4654-a97a-bbdf36f0c3c0" + "marking-definition--24c4802c-ba22-42ec-8d8b-007d95cafea0" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -1532,16 +968,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--00aabe3c-19ef-4658-aec6-0bbf2fc9a675", - "created_by_ref": "identity--04f085f5-9ea4-4cf2-a187-57431fe27396", - "created": "2022-06-29T15:07:39.6456Z", - "modified": "2022-06-29T15:07:39.6456Z", - "name": "Demand unsurmountable proof", - "description": "TA08", + "id": "attack-pattern--be4cb928-74dd-4243-bae4-c1bb10540fcc", + "created_by_ref": "identity--0f426ba3-e76e-45e4-8e42-3fca3f75d09a", + "created": "2022-07-01T03:29:17.10816Z", + "modified": "2022-07-01T03:29:17.10816Z", + "name": "Demand insurmountable proof", + "description": "TA14", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "pump-priming" + "phase_name": "develop-narratives" } ], "external_references": [ @@ -1552,7 +988,7 @@ } ], "object_marking_refs": [ - "marking-definition--2e6feaa4-0c79-4474-b380-c16ffdd4799e" + "marking-definition--813c3ad8-34c8-488c-b3f7-7cf05abb3f41" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -1565,49 +1001,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--f8a959f9-b687-4c31-9deb-5a06e63cd875", - "created_by_ref": "identity--283d6581-1c8a-458b-af6a-50dd0e9b8863", - "created": "2022-06-29T15:07:39.646459Z", - "modified": "2022-06-29T15:07:39.646459Z", - "name": "Deny involvement", + "id": "attack-pattern--670a229b-d2b3-40ae-8684-32ed5253fa30", + "created_by_ref": "identity--7fc9ce06-d085-4bbc-98eb-7c160b29c799", + "created": "2022-07-01T03:29:17.108618Z", + "modified": "2022-07-01T03:29:17.108618Z", + "name": "Seed Kernel of truth", "description": "TA08", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "pump-priming" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0041.md", - "external_id": "T0041" - } - ], - "object_marking_refs": [ - "marking-definition--07ac7a54-b81f-4437-9ec9-9265e903bb6a" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--15befb69-cd3a-436d-aacb-65d4a31233d9", - "created_by_ref": "identity--afc71eb6-14b5-44fd-a7a1-35f88f2fbb79", - "created": "2022-06-29T15:07:39.647547Z", - "modified": "2022-06-29T15:07:39.647547Z", - "name": "Kernel of Truth", - "description": "TA08", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "pump-priming" + "phase_name": "conduct-pump-priming" } ], "external_references": [ @@ -1618,7 +1021,7 @@ } ], "object_marking_refs": [ - "marking-definition--fc4be82a-c933-4783-9df4-b5b0c7d80a91" + "marking-definition--f0fdf08b-0e76-4424-abc5-18a83861904d" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -1631,16 +1034,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--b26a909a-26cf-475a-9073-cd1c05a6666e", - "created_by_ref": "identity--fcd733c4-48df-46d7-ae37-faa74290cd9b", - "created": "2022-06-29T15:07:39.648402Z", - "modified": "2022-06-29T15:07:39.648402Z", - "name": "Use SMS/ WhatsApp/ Chat apps", - "description": "TA08", + "id": "attack-pattern--474442df-9662-4d6a-8936-1bf7a71f4118", + "created_by_ref": "identity--3d6ad857-87da-4328-b5bb-734f0be9f047", + "created": "2022-07-01T03:29:17.109075Z", + "modified": "2022-07-01T03:29:17.109075Z", + "name": "Chat apps", + "description": "TA07", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "pump-priming" + "phase_name": "select-channels-and-affordances" } ], "external_references": [ @@ -1651,7 +1054,7 @@ } ], "object_marking_refs": [ - "marking-definition--11403d9c-d1ed-4ef4-add4-f556a75e91db" + "marking-definition--f00e21f3-820b-458d-a385-e8cb7cec337c" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -1664,16 +1067,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--fc64a9ea-e918-4234-a887-197783cf1b24", - "created_by_ref": "identity--4c0cfcee-6771-424a-9949-048a1eb143ec", - "created": "2022-06-29T15:07:39.649313Z", - "modified": "2022-06-29T15:07:39.649313Z", + "id": "attack-pattern--976326b8-9bb8-4762-bf85-2e463a534f80", + "created_by_ref": "identity--72e1d4d3-1b4f-40cb-8486-7fa17d59d4fe", + "created": "2022-07-01T03:29:17.109537Z", + "modified": "2022-07-01T03:29:17.109537Z", "name": "Seed distortions", "description": "TA08", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "pump-priming" + "phase_name": "conduct-pump-priming" } ], "external_references": [ @@ -1684,7 +1087,7 @@ } ], "object_marking_refs": [ - "marking-definition--da4bb9c7-d6f4-477d-80a7-e5770ec4e3fa" + "marking-definition--8aee4ccb-7e2e-462f-8ae7-41f424c8c8f4" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -1697,16 +1100,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--b00e5ddc-d058-4c95-bbeb-e319c45c4209", - "created_by_ref": "identity--233e6a79-d4b8-47ff-8069-a7b3ba016fe5", - "created": "2022-06-29T15:07:39.650266Z", - "modified": "2022-06-29T15:07:39.650266Z", + "id": "attack-pattern--7ae144a2-3b79-4740-b651-2d24c2c1a4b1", + "created_by_ref": "identity--649e1891-37f6-459c-87d9-bc02129f0023", + "created": "2022-07-01T03:29:17.109986Z", + "modified": "2022-07-01T03:29:17.109986Z", "name": "Use fake experts", "description": "TA08", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "pump-priming" + "phase_name": "conduct-pump-priming" } ], "external_references": [ @@ -1717,7 +1120,7 @@ } ], "object_marking_refs": [ - "marking-definition--03fa1f90-ecd1-4c5f-8250-f0342df68267" + "marking-definition--a086a228-95e2-4a73-8f45-73bc6df77063" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -1730,16 +1133,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--bc283648-febe-4abc-b09f-9f57e4778c2e", - "created_by_ref": "identity--2b8570fe-aece-4178-9c33-138d0019412e", - "created": "2022-06-29T15:07:39.651502Z", - "modified": "2022-06-29T15:07:39.651502Z", - "name": "Search Engine Optimization", + "id": "attack-pattern--6427ef0d-29ee-4b97-a3c6-db7595938187", + "created_by_ref": "identity--52aa5c8b-baa0-4b4b-81dc-3b0337180f85", + "created": "2022-07-01T03:29:17.11044Z", + "modified": "2022-07-01T03:29:17.11044Z", + "name": "Use Search Engine Optimization", "description": "TA08", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "pump-priming" + "phase_name": "conduct-pump-priming" } ], "external_references": [ @@ -1750,7 +1153,7 @@ } ], "object_marking_refs": [ - "marking-definition--b4c34737-3f47-4665-ab2d-1e7fde67bfae" + "marking-definition--e1cbfcdc-3d0b-4a0f-8924-0b60f6e7db54" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -1763,16 +1166,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--0527b90a-1628-48ee-9a63-b9fa8af1f05e", - "created_by_ref": "identity--8a2b8d9d-b740-4810-aabd-16072cdf0f97", - "created": "2022-06-29T15:07:39.652346Z", - "modified": "2022-06-29T15:07:39.652346Z", - "name": "Muzzle social media as a political force", - "description": "TA09", + "id": "attack-pattern--8e05e3e1-beaa-49b9-a2f1-7200d363a900", + "created_by_ref": "identity--cd267b72-9ade-4cb3-816d-db8785ecbccd", + "created": "2022-07-01T03:29:17.110895Z", + "modified": "2022-07-01T03:29:17.110895Z", + "name": "Censor social media as a political force", + "description": "TA18", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "exposure" + "phase_name": "drive-online-harms" } ], "external_references": [ @@ -1783,7 +1186,7 @@ } ], "object_marking_refs": [ - "marking-definition--42cb73d0-14c4-44e2-a722-466ca266ee78" + "marking-definition--054e01ae-7378-415b-85cc-7f3751559c03" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -1796,16 +1199,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--bc725cb5-9c6a-42da-880b-b6e0eacaf546", - "created_by_ref": "identity--9bc3e2bc-a39d-46e5-bc80-83c740de79f1", - "created": "2022-06-29T15:07:39.65319Z", - "modified": "2022-06-29T15:07:39.65319Z", - "name": "Cow online opinion leaders", - "description": "TA09", + "id": "attack-pattern--d053b450-19a8-44c7-a847-6fd11ba6f69a", + "created_by_ref": "identity--54dddb49-ea23-4b28-959d-d68f3ffe6964", + "created": "2022-07-01T03:29:17.111351Z", + "modified": "2022-07-01T03:29:17.111351Z", + "name": "Harass", + "description": "TA18", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "exposure" + "phase_name": "drive-online-harms" } ], "external_references": [ @@ -1816,7 +1219,7 @@ } ], "object_marking_refs": [ - "marking-definition--e68b79a3-2136-4a07-80bb-7b4b50e17f29" + "marking-definition--53bfe890-fcbd-4e0a-a085-76874996797a" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -1829,16 +1232,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--aac86bd2-8f32-4177-9bfe-26ab811b3a58", - "created_by_ref": "identity--cde3ccc9-4f7e-4dde-9c25-912f897161ca", - "created": "2022-06-29T15:07:39.65403Z", - "modified": "2022-06-29T15:07:39.65403Z", - "name": "Flooding", - "description": "TA09", + "id": "attack-pattern--68bcc375-48d3-4efe-aa6b-dc94b2c9be3b", + "created_by_ref": "identity--c12463fb-d446-4d46-86d8-187a9ccd523e", + "created": "2022-07-01T03:29:17.111805Z", + "modified": "2022-07-01T03:29:17.111805Z", + "name": "Flooding the Information Space", + "description": "TA17", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "exposure" + "phase_name": "maximize-exposure" } ], "external_references": [ @@ -1849,7 +1252,7 @@ } ], "object_marking_refs": [ - "marking-definition--0f2d59a5-d16b-41d9-b7b9-5e89aedb76c6" + "marking-definition--ce5228d1-307d-4b48-99bd-dc5f8baf0157" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -1862,242 +1265,11 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--a85945cc-b898-433a-be92-eca07ec1aa91", - "created_by_ref": "identity--575dfd43-182b-4124-a79d-46cf773eb1d6", - "created": "2022-06-29T15:07:39.654957Z", - "modified": "2022-06-29T15:07:39.654957Z", - "name": "Cheerleading domestic social media ops", - "description": "TA09", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "exposure" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0050.md", - "external_id": "T0050" - } - ], - "object_marking_refs": [ - "marking-definition--2baad641-b04a-493e-9bf1-5eb7e5b2cbf5" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--1c8f05cf-413d-49a3-94b6-58a7a98d7ef8", - "created_by_ref": "identity--63b90850-3d52-40de-829f-b0a109696675", - "created": "2022-06-29T15:07:39.655847Z", - "modified": "2022-06-29T15:07:39.655847Z", - "name": "Fabricate social media comment", - "description": "TA09", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "exposure" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0051.md", - "external_id": "T0051" - } - ], - "object_marking_refs": [ - "marking-definition--9dbb9ca6-8a99-4387-b8c1-0612364eba1d" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--0d1dcc47-dbd5-4b4d-bedf-e6b5321086a9", - "created_by_ref": "identity--edc70461-aee4-45d2-af9b-a7bfd245f83a", - "created": "2022-06-29T15:07:39.656664Z", - "modified": "2022-06-29T15:07:39.656664Z", - "name": "Tertiary sites amplify news", - "description": "TA09", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "exposure" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0052.md", - "external_id": "T0052" - } - ], - "object_marking_refs": [ - "marking-definition--29dfd462-e316-4667-b832-6fd1045344e2" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--40e9751b-4af7-4433-936f-ba4c04c03a0a", - "created_by_ref": "identity--dd806483-fcc5-4f59-bbf3-f93289e01791", - "created": "2022-06-29T15:07:39.657442Z", - "modified": "2022-06-29T15:07:39.657442Z", - "name": "Twitter trolls amplify and manipulate", - "description": "TA09", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "exposure" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0053.md", - "external_id": "T0053" - } - ], - "object_marking_refs": [ - "marking-definition--f93162c6-e04b-4252-82e6-d663c85d0d1a" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--0a778eec-5cdd-4a35-a178-6453d9295c71", - "created_by_ref": "identity--36599099-8622-4849-bda0-6f36fe4420e5", - "created": "2022-06-29T15:07:39.658726Z", - "modified": "2022-06-29T15:07:39.658726Z", - "name": "Twitter bots amplify", - "description": "TA09", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "exposure" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0054.md", - "external_id": "T0054" - } - ], - "object_marking_refs": [ - "marking-definition--e14b09fe-550c-4303-8560-679ebd896b10" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--6bb89169-af6e-41d7-8ee6-5e6ca0778b23", - "created_by_ref": "identity--b7adce0d-6fd8-4d25-8254-f34ce9721b28", - "created": "2022-06-29T15:07:39.659606Z", - "modified": "2022-06-29T15:07:39.659606Z", - "name": "Use hashtag", - "description": "TA09", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "exposure" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0055.md", - "external_id": "T0055" - } - ], - "object_marking_refs": [ - "marking-definition--a16dbe3d-b808-4942-a563-13e088a7dc1a" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--08061315-22ae-4838-8413-6909586a0356", - "created_by_ref": "identity--2580ddb8-9b92-4654-97dd-19ded33583ee", - "created": "2022-06-29T15:07:39.660319Z", - "modified": "2022-06-29T15:07:39.660319Z", - "name": "Dedicated channels disseminate information pollution", - "description": "TA09", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "exposure" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0056.md", - "external_id": "T0056" - } - ], - "object_marking_refs": [ - "marking-definition--630ff03e-fbcf-4d93-baf7-d06661fb65db" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--7b3dd190-7a38-4944-aeb0-e1d7592c8c3b", - "created_by_ref": "identity--6a5453fb-9ad6-45d7-ada3-7d8e65ea41ad", - "created": "2022-06-29T15:07:39.66129Z", - "modified": "2022-06-29T15:07:39.66129Z", - "name": "Organise remote rallies and events", + "id": "attack-pattern--5ced2330-8d58-4417-8ae3-ce66cabb513c", + "created_by_ref": "identity--6edd4070-0d58-4fcb-a92c-1cd606b1e372", + "created": "2022-07-01T03:29:17.112292Z", + "modified": "2022-07-01T03:29:17.112292Z", + "name": "Organize Events", "description": "TA10", "kill_chain_phases": [ { @@ -2113,7 +1285,7 @@ } ], "object_marking_refs": [ - "marking-definition--6ff67578-a4a0-4353-844b-2d86bb87e4a0" + "marking-definition--b4a225e6-c764-4dc7-907a-91c3b332d65d" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -2126,49 +1298,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--b87a6150-0913-4161-b6f2-190881a12058", - "created_by_ref": "identity--7d23cd01-4491-4667-99c8-e48e5fda3a57", - "created": "2022-06-29T15:07:39.662167Z", - "modified": "2022-06-29T15:07:39.662167Z", - "name": "Legacy web content", - "description": "TA11", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "persistence" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0058.md", - "external_id": "T0058" - } - ], - "object_marking_refs": [ - "marking-definition--c00b8748-a8cb-49d9-aa00-ce0d55d185a4" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--ee02b052-755c-4e8a-ad6d-7bab7ec88a84", - "created_by_ref": "identity--bc243e05-9718-4edf-bbca-4af2b8b29971", - "created": "2022-06-29T15:07:39.662962Z", - "modified": "2022-06-29T15:07:39.662962Z", + "id": "attack-pattern--08850f6c-e006-4c4f-886b-c904d8fb77f5", + "created_by_ref": "identity--2f19463e-0d5e-4578-a45f-ecef828a771b", + "created": "2022-07-01T03:29:17.11275Z", + "modified": "2022-07-01T03:29:17.11275Z", "name": "Play the long game", "description": "TA11", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "persistence" + "phase_name": "persist-in-the-information-environment" } ], "external_references": [ @@ -2179,7 +1318,7 @@ } ], "object_marking_refs": [ - "marking-definition--16114ef5-a787-4b4a-8736-5198f48011c4" + "marking-definition--02d2bd8f-5650-473c-b7b8-7c42a13c9820" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -2192,16 +1331,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--b463d063-b47b-42ad-ae6c-63ddf738b509", - "created_by_ref": "identity--81ae2c07-7ef0-40ef-b13e-3c693905a251", - "created": "2022-06-29T15:07:39.66387Z", - "modified": "2022-06-29T15:07:39.66387Z", - "name": "Continue to amplify", + "id": "attack-pattern--b499ae71-92f2-41b4-94f1-a3c061a96871", + "created_by_ref": "identity--7c5a1256-d940-4fd2-ab27-0072959a20bd", + "created": "2022-07-01T03:29:17.113212Z", + "modified": "2022-07-01T03:29:17.113212Z", + "name": "Continue to Amplify", "description": "TA11", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "persistence" + "phase_name": "persist-in-the-information-environment" } ], "external_references": [ @@ -2212,7 +1351,7 @@ } ], "object_marking_refs": [ - "marking-definition--25772063-9811-4713-a2d4-6136c3dd1a84" + "marking-definition--31e37208-2a7d-43c4-b831-7e3462c2b2ee" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -2225,11 +1364,11 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--4ccf7878-ca79-443a-bc53-dbc5a32cdca5", - "created_by_ref": "identity--081e355e-4913-403b-b5b0-2decfe75acb2", - "created": "2022-06-29T15:07:39.664619Z", - "modified": "2022-06-29T15:07:39.664619Z", - "name": "Sell merchandising", + "id": "attack-pattern--0590dab3-9ceb-4b71-9187-8847ed98f0c5", + "created_by_ref": "identity--81fccebf-8fd2-4369-b6d8-eb7bc5a94dc4", + "created": "2022-07-01T03:29:17.113675Z", + "modified": "2022-07-01T03:29:17.113675Z", + "name": "Sell Merchandise", "description": "TA10", "kill_chain_phases": [ { @@ -2245,7 +1384,7 @@ } ], "object_marking_refs": [ - "marking-definition--985e7b21-f851-4d00-a243-81ae85893185" + "marking-definition--ef2c3e54-f8ba-4edc-8460-be63c6cfc8c7" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -2258,115 +1397,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--3491ca2c-d41c-441e-8f25-6b095b045eec", - "created_by_ref": "identity--64060b20-48ea-4363-93c4-b0595d45008b", - "created": "2022-06-29T15:07:39.665912Z", - "modified": "2022-06-29T15:07:39.665912Z", - "name": "Behaviour changes", - "description": "TA12", + "id": "attack-pattern--c50c3595-ae68-4e13-8b76-40359cd0846a", + "created_by_ref": "identity--24f42049-ba0d-4bc3-8a8a-1121fb44228c", + "created": "2022-07-01T03:29:17.114138Z", + "modified": "2022-07-01T03:29:17.114138Z", + "name": "Prepare Physical Broadcast Capabilities", + "description": "TA15", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "measure-effectiveness" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0062.md", - "external_id": "T0062" - } - ], - "object_marking_refs": [ - "marking-definition--7b816be9-3a03-4d91-b131-4da2f4a392c4" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--18f72131-588a-45b9-9c27-e98d8afc3894", - "created_by_ref": "identity--beb9c87a-7b02-47ee-9bdc-fcc81dbefc06", - "created": "2022-06-29T15:07:39.666666Z", - "modified": "2022-06-29T15:07:39.666666Z", - "name": "Message reach", - "description": "TA12", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "measure-effectiveness" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0063.md", - "external_id": "T0063" - } - ], - "object_marking_refs": [ - "marking-definition--eef2db77-ca5e-45b6-b527-8621c5ee7fe8" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--ecefdcdc-b3f2-4ab4-a68f-e0d3eb1f1e93", - "created_by_ref": "identity--1c32f480-43ff-465e-ae3f-27a5c26492fd", - "created": "2022-06-29T15:07:39.667406Z", - "modified": "2022-06-29T15:07:39.667406Z", - "name": "Social media engagement", - "description": "TA12", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "measure-effectiveness" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0064.md", - "external_id": "T0064" - } - ], - "object_marking_refs": [ - "marking-definition--56fb8dbc-d520-4738-a907-b2c8268fe0e3" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--bc94c49f-2121-4e3b-8f1a-8a72d9df4f8d", - "created_by_ref": "identity--1649545c-f9ba-40d6-8819-527b358f0320", - "created": "2022-06-29T15:07:39.668156Z", - "modified": "2022-06-29T15:07:39.668156Z", - "name": "Use physical broadcast capabilities", - "description": "TA04", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "develop-networks" + "phase_name": "establish-social-assets" } ], "external_references": [ @@ -2377,7 +1417,7 @@ } ], "object_marking_refs": [ - "marking-definition--b37e3f6b-8488-45e6-acaf-35add129b24c" + "marking-definition--66721b32-473e-4f07-b524-25780f47c326" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -2390,16 +1430,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--f2292557-c4d2-49c8-bac5-2bdb9ff43165", - "created_by_ref": "identity--3d83a869-9099-4861-af28-bcfcd5bd09a1", - "created": "2022-06-29T15:07:39.668922Z", - "modified": "2022-06-29T15:07:39.668922Z", - "name": "Degrade adversary", + "id": "attack-pattern--8311c92c-61a1-4277-afca-5c4a43e18c06", + "created_by_ref": "identity--cfb5f6df-5c4d-4a9a-823e-337fa893c6b7", + "created": "2022-07-01T03:29:17.114594Z", + "modified": "2022-07-01T03:29:17.114594Z", + "name": "Degrade Adversary", "description": "TA02", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "objective-planning" + "phase_name": "plan-objectives" } ], "external_references": [ @@ -2410,7 +1450,7 @@ } ], "object_marking_refs": [ - "marking-definition--7f0968ff-b34a-4453-a8eb-cdabb7a5f0e2" + "marking-definition--b04ba37c-7f96-4ce1-b762-dee94ae0bd38" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -2423,49 +1463,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--ee320afa-9925-4609-ba01-1b345aba7abd", - "created_by_ref": "identity--12032cf4-860c-4ce5-b3ed-79fe470d0691", - "created": "2022-06-29T15:07:39.669754Z", - "modified": "2022-06-29T15:07:39.669754Z", - "name": "Plan to discredit credible sources", - "description": "TA02", + "id": "attack-pattern--82df414a-473f-4d78-9bb0-ee9efd58965c", + "created_by_ref": "identity--9be00094-7bf8-4112-8695-c3f7debcfc07", + "created": "2022-07-01T03:29:17.115059Z", + "modified": "2022-07-01T03:29:17.115059Z", + "name": "Respond to Breaking News Event or Active Crisis", + "description": "TA14", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "objective-planning" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0067.md", - "external_id": "T0067" - } - ], - "object_marking_refs": [ - "marking-definition--054c9054-713c-4d33-b64a-782762b19697" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--ce6626db-4c1a-4b99-bc4c-bc2d5898c186", - "created_by_ref": "identity--41a22faf-481a-479c-ab75-a891814eb827", - "created": "2022-06-29T15:07:39.670552Z", - "modified": "2022-06-29T15:07:39.670552Z", - "name": "Respond to breaking news event", - "description": "TA02", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "objective-planning" + "phase_name": "develop-narratives" } ], "external_references": [ @@ -2476,7 +1483,7 @@ } ], "object_marking_refs": [ - "marking-definition--0f810227-bdc9-41fe-9306-5d7458763f2d" + "marking-definition--879a346f-3cc6-4e3a-accd-2d0ae5b6f2f2" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -2489,115 +1496,16 @@ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--40c5fb5f-3b61-44ed-9f9d-206b26fda76c", - "created_by_ref": "identity--b9e7689b-2823-42f4-9d4e-87e719780725", - "created": "2022-06-29T15:07:39.671351Z", - "modified": "2022-06-29T15:07:39.671351Z", - "name": "Respond to active crisis", - "description": "TA02", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "objective-planning" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0069.md", - "external_id": "T0069" - } - ], - "object_marking_refs": [ - "marking-definition--f54a004d-60a8-4869-8458-0eea4167d0d2" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--5661a6e3-4eef-4983-bf67-ade655c61b41", - "created_by_ref": "identity--1edf1f3b-897f-4983-b2e9-ada3f05908bf", - "created": "2022-06-29T15:07:39.672282Z", - "modified": "2022-06-29T15:07:39.672282Z", - "name": "Analyze existing communities", - "description": "TA02", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "objective-planning" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0070.md", - "external_id": "T0070" - } - ], - "object_marking_refs": [ - "marking-definition--2f71a7e8-5ad1-4d6e-9ec5-4e1b5b764f2e" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--58e8704d-e76c-4b1d-8255-a980403e2ec5", - "created_by_ref": "identity--2851616b-dd3e-43b3-88f8-007a7f6a1532", - "created": "2022-06-29T15:07:39.673166Z", - "modified": "2022-06-29T15:07:39.673166Z", - "name": "Find echo chambers", + "id": "attack-pattern--21c051ac-c395-4ac0-a064-f97aff09639b", + "created_by_ref": "identity--66aa20b5-b271-42ea-b341-498721a297b4", + "created": "2022-07-01T03:29:17.115517Z", + "modified": "2022-07-01T03:29:17.115517Z", + "name": "Segment Audiences", "description": "TA13", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "conduct-center-of-gravity-analysis" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0071.md", - "external_id": "T0071" - } - ], - "object_marking_refs": [ - "marking-definition--46bba0a9-84c1-436e-abed-baaa07827448" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - }, - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--1bd1d867-a9bc-46ee-8b3b-d8907ecb4986", - "created_by_ref": "identity--eb576670-0d92-489f-8bb8-ca4af90bc1ff", - "created": "2022-06-29T15:07:39.674013Z", - "modified": "2022-06-29T15:07:39.674013Z", - "name": "Segment audiences", - "description": "TA13", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "conduct-center-of-gravity-analysis" + "phase_name": "target-audience-analysis" } ], "external_references": [ @@ -2608,7 +1516,2053 @@ } ], "object_marking_refs": [ - "marking-definition--9d95da9e-41d5-4ca6-9230-3afda70cca8f" + "marking-definition--fbb99453-572c-48a8-a6f6-b7d63530c287" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--5a63d85c-fe2a-4932-8db2-f5efaabdfff5", + "created_by_ref": "identity--b6bd7a37-8032-46e7-bda4-0605831594c3", + "created": "2022-07-01T03:29:17.115975Z", + "modified": "2022-07-01T03:29:17.115975Z", + "name": "Determine Target Audiences", + "description": "TA01", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-strategy" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0073.md", + "external_id": "T0073" + } + ], + "object_marking_refs": [ + "marking-definition--7c733617-4276-4f98-94a3-c8b7ad2e371e" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--d9e11aed-9dd8-4475-8ae5-8712ff59f586", + "created_by_ref": "identity--d1019309-43a3-4678-9e95-0dcc6adf34db", + "created": "2022-07-01T03:29:17.116426Z", + "modified": "2022-07-01T03:29:17.116426Z", + "name": "Determine Strategic Ends", + "description": "TA01", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-strategy" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0074.md", + "external_id": "T0074" + } + ], + "object_marking_refs": [ + "marking-definition--7c51b002-f10f-4d6a-822d-4222b2b6bc2b" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--fe45dbba-bd39-40a4-b62a-befd4cd7a11f", + "created_by_ref": "identity--ce3227cb-dbca-431c-9508-bd9b38c37f02", + "created": "2022-07-01T03:29:17.116887Z", + "modified": "2022-07-01T03:29:17.116887Z", + "name": "Dismiss", + "description": "TA02", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0075.md", + "external_id": "T0075" + } + ], + "object_marking_refs": [ + "marking-definition--a58597d6-33a8-492d-a437-fb7b94fdb267" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--36f2f883-c35e-49e4-8908-7002029f200a", + "created_by_ref": "identity--435d8bae-f490-434e-ae08-a769da31c9ff", + "created": "2022-07-01T03:29:17.117339Z", + "modified": "2022-07-01T03:29:17.117339Z", + "name": "Distort", + "description": "TA02", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0076.md", + "external_id": "T0076" + } + ], + "object_marking_refs": [ + "marking-definition--436a148e-4689-48bf-bfee-44345ad7b74d" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--ad9ae97c-340b-4e33-96fe-ee0ad1407eb0", + "created_by_ref": "identity--533564df-a233-45cc-a4bd-67dde9b464a3", + "created": "2022-07-01T03:29:17.117798Z", + "modified": "2022-07-01T03:29:17.117798Z", + "name": "Distract", + "description": "TA02", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0077.md", + "external_id": "T0077" + } + ], + "object_marking_refs": [ + "marking-definition--08870f86-287a-418d-aec3-1e5ccf8543b7" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--156bbbf4-8f8a-44f3-9533-af5118313265", + "created_by_ref": "identity--0fbb6aa3-5a2c-4965-bad7-e1a009a30414", + "created": "2022-07-01T03:29:17.118259Z", + "modified": "2022-07-01T03:29:17.118259Z", + "name": "Dismay", + "description": "TA02", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0078.md", + "external_id": "T0078" + } + ], + "object_marking_refs": [ + "marking-definition--0745cf80-2737-42fc-8f9d-816fb5e54dfd" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--571a7838-129d-4251-b809-3309b9e8aa5f", + "created_by_ref": "identity--406cf1bb-fe17-4550-b474-c0199f3e6e7c", + "created": "2022-07-01T03:29:17.11871Z", + "modified": "2022-07-01T03:29:17.11871Z", + "name": "Divide", + "description": "TA02", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0079.md", + "external_id": "T0079" + } + ], + "object_marking_refs": [ + "marking-definition--f0f06852-d69f-4922-a268-3cca81dfe969" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--d538394c-6e96-4019-851d-f16db761bfb9", + "created_by_ref": "identity--83f9262b-4bd1-4abd-b280-723cda0c0770", + "created": "2022-07-01T03:29:17.119171Z", + "modified": "2022-07-01T03:29:17.119171Z", + "name": "Map Target Audience Information Environment", + "description": "TA13", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "target-audience-analysis" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0080.md", + "external_id": "T0080" + } + ], + "object_marking_refs": [ + "marking-definition--b57d8117-50dc-4f53-992c-e1dd829298cc" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--06e0e6e4-1c50-4813-9ff3-f49592514ab8", + "created_by_ref": "identity--1436a742-18aa-4755-a263-57093176e4e9", + "created": "2022-07-01T03:29:17.119621Z", + "modified": "2022-07-01T03:29:17.119621Z", + "name": "Identify Social and Technical Vulnerabilities", + "description": "TA13", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "target-audience-analysis" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0081.md", + "external_id": "T0081" + } + ], + "object_marking_refs": [ + "marking-definition--897d9914-1f35-4b99-8192-8bc918077f22" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--aa45be8a-db0f-422f-96d0-9959091d70b6", + "created_by_ref": "identity--a9de2212-e29b-40c5-a5f2-96262b6ab411", + "created": "2022-07-01T03:29:17.120074Z", + "modified": "2022-07-01T03:29:17.120074Z", + "name": "Develop New Narratives", + "description": "TA14", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "develop-narratives" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0082.md", + "external_id": "T0082" + } + ], + "object_marking_refs": [ + "marking-definition--5395b9fe-bc52-4781-a8d7-b2e89efffb7d" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--17f077e3-6308-4266-9f63-06d69db6fb45", + "created_by_ref": "identity--2c304336-3c15-47fb-929a-26b00f4d0b65", + "created": "2022-07-01T03:29:17.120528Z", + "modified": "2022-07-01T03:29:17.120528Z", + "name": "Integrate Target Audience Vulnerabilities into Narrative", + "description": "TA14", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "develop-narratives" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0083.md", + "external_id": "T0083" + } + ], + "object_marking_refs": [ + "marking-definition--273d5ee8-e85f-451f-9fa3-466df09eae72" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--e5a96616-8465-4184-ac6f-09b46bdb5e1f", + "created_by_ref": "identity--b091aac5-cc47-4c38-a077-15d5acb0564c", + "created": "2022-07-01T03:29:17.120982Z", + "modified": "2022-07-01T03:29:17.120982Z", + "name": "Reuse Existing Content", + "description": "TA06", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "develop-content" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0084.md", + "external_id": "T0084" + } + ], + "object_marking_refs": [ + "marking-definition--af398d8c-ff47-4d4c-b671-e73af7df50f4" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--9988cf65-495c-4880-95c1-f660858e7939", + "created_by_ref": "identity--c48b52b0-b82d-4bda-98c7-01a8f94a99ba", + "created": "2022-07-01T03:29:17.121437Z", + "modified": "2022-07-01T03:29:17.121437Z", + "name": "Develop Text-based Content", + "description": "TA06", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "develop-content" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0085.md", + "external_id": "T0085" + } + ], + "object_marking_refs": [ + "marking-definition--728e63f8-bd2b-4daa-a1cc-bd368c32ed74" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--58c939d8-05bb-45ca-b12d-dcd9cc8df2dc", + "created_by_ref": "identity--e46499c8-aed1-4aeb-80ff-a73482840b99", + "created": "2022-07-01T03:29:17.121892Z", + "modified": "2022-07-01T03:29:17.121892Z", + "name": "Develop Image-based Content", + "description": "TA06", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "develop-content" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0086.md", + "external_id": "T0086" + } + ], + "object_marking_refs": [ + "marking-definition--8f90dd1e-493a-45f6-afd6-160a43d5980f" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--41cd20d5-2365-446a-bd9d-5756ff5f5986", + "created_by_ref": "identity--a8bb5ff1-6d2f-4d1f-901d-77eb1c1cd8d8", + "created": "2022-07-01T03:29:17.122352Z", + "modified": "2022-07-01T03:29:17.122352Z", + "name": "Develop Video-based Content", + "description": "TA06", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "develop-content" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0087.md", + "external_id": "T0087" + } + ], + "object_marking_refs": [ + "marking-definition--59edea27-8e32-4551-81f0-7406355eb952" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--b25838c1-95b5-4c31-a1bc-f4b5e4994854", + "created_by_ref": "identity--a5fd4261-af1c-4f01-8c80-548a054a1235", + "created": "2022-07-01T03:29:17.122823Z", + "modified": "2022-07-01T03:29:17.122823Z", + "name": "Develop Audio-based Content", + "description": "TA06", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "develop-content" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0088.md", + "external_id": "T0088" + } + ], + "object_marking_refs": [ + "marking-definition--3fb5f453-07e4-433f-8e63-158bc202fec8" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--82022c93-6e94-4842-99b6-93a783657a12", + "created_by_ref": "identity--6f3df079-f7df-473f-8e69-65e4867052e6", + "created": "2022-07-01T03:29:17.123282Z", + "modified": "2022-07-01T03:29:17.123282Z", + "name": "Obtain Private Documents", + "description": "TA06", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "develop-content" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0089.md", + "external_id": "T0089" + } + ], + "object_marking_refs": [ + "marking-definition--73f8f675-6ecb-4d1b-bc52-8b52558d8493" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--8702511a-d1e3-4ca5-97a3-0a8b33bbdf53", + "created_by_ref": "identity--a26fa083-3fc8-4278-8ed5-77a44b571648", + "created": "2022-07-01T03:29:17.123743Z", + "modified": "2022-07-01T03:29:17.123743Z", + "name": "Create Inauthentic Accounts", + "description": "TA15", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-social-assets" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0090.md", + "external_id": "T0090" + } + ], + "object_marking_refs": [ + "marking-definition--c15c1264-bd1f-40d1-b0a2-bb3f67de3659" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--eea82e81-08cd-42f7-9c3f-32d296341fee", + "created_by_ref": "identity--05400086-dfff-4980-bb7d-ec94e33ae378", + "created": "2022-07-01T03:29:17.124198Z", + "modified": "2022-07-01T03:29:17.124198Z", + "name": "Recruit bad actors", + "description": "TA15", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-social-assets" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0091.md", + "external_id": "T0091" + } + ], + "object_marking_refs": [ + "marking-definition--860df523-d43d-4b94-a3e7-33382331c6d5" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--378c1a19-24f1-466d-a5f8-93457ca0b89c", + "created_by_ref": "identity--a13afd19-3282-4cee-9704-a69dae1249b8", + "created": "2022-07-01T03:29:17.124689Z", + "modified": "2022-07-01T03:29:17.124689Z", + "name": "Build Network", + "description": "TA15", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-social-assets" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0092.md", + "external_id": "T0092" + } + ], + "object_marking_refs": [ + "marking-definition--249a4868-99f9-4e0b-be59-7925d3d061b9" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--86b561d4-5a64-4dbb-bc52-2c68bdec854a", + "created_by_ref": "identity--be1c3972-948e-444a-8bce-61c3b8643de9", + "created": "2022-07-01T03:29:17.125148Z", + "modified": "2022-07-01T03:29:17.125148Z", + "name": "Acquire/ recruit Network", + "description": "TA15", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-social-assets" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0093.md", + "external_id": "T0093" + } + ], + "object_marking_refs": [ + "marking-definition--6ff5c683-050b-4fa1-a54f-49cb8d1d3df2" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--4ccec7a7-945f-40c2-8b51-a5701ae8aa14", + "created_by_ref": "identity--799d635e-d062-4488-aaa4-ab32cd1763da", + "created": "2022-07-01T03:29:17.125607Z", + "modified": "2022-07-01T03:29:17.125607Z", + "name": "Infiltrate Existing Networks", + "description": "TA15", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-social-assets" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0094.md", + "external_id": "T0094" + } + ], + "object_marking_refs": [ + "marking-definition--7200a735-ad5b-4c08-ad3e-07d725a7faac" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--ab0f7411-ff09-4897-b55c-301fdd6276b8", + "created_by_ref": "identity--3b10ff39-a4f1-461b-9b82-26e85d98d99d", + "created": "2022-07-01T03:29:17.126065Z", + "modified": "2022-07-01T03:29:17.126065Z", + "name": "Develop Owned Media Assets", + "description": "TA15", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-social-assets" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0095.md", + "external_id": "T0095" + } + ], + "object_marking_refs": [ + "marking-definition--2c194b27-329e-41fb-98ed-df4f06db3141" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--5db1d9a2-52a4-4b43-bca4-cdb387335a3b", + "created_by_ref": "identity--5f39833d-3706-4af3-b5db-9f00bdc5e02c", + "created": "2022-07-01T03:29:17.126517Z", + "modified": "2022-07-01T03:29:17.126517Z", + "name": "Leverage Content Farm", + "description": "TA15", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-social-assets" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0096.md", + "external_id": "T0096" + } + ], + "object_marking_refs": [ + "marking-definition--f7ea534a-bb6f-4ea3-a4f2-24a05bcc6a32" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--e00abc7f-5f53-487a-8562-e3ba4c6ca0b6", + "created_by_ref": "identity--7a62d925-cec9-4cde-a5b4-e4eb5ee97b73", + "created": "2022-07-01T03:29:17.126973Z", + "modified": "2022-07-01T03:29:17.126973Z", + "name": "Create personas", + "description": "TA16", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-legitimacy" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0097.md", + "external_id": "T0097" + } + ], + "object_marking_refs": [ + "marking-definition--aa05a95c-e43f-490a-ac96-f7f0c5fe3fef" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--ecfdb2b2-5841-4c61-ae57-1bfa1dd50a87", + "created_by_ref": "identity--22a4d897-ac44-41d7-9761-d1c23a31ce28", + "created": "2022-07-01T03:29:17.127428Z", + "modified": "2022-07-01T03:29:17.127428Z", + "name": "Establish Inauthentic News Sites", + "description": "TA16", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-legitimacy" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0098.md", + "external_id": "T0098" + } + ], + "object_marking_refs": [ + "marking-definition--d684d1f9-7edd-412e-a730-e5cf08509bbf" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--69e703e0-990f-45cf-a4eb-9eb2193ee58d", + "created_by_ref": "identity--81d31ff3-891e-4a34-b094-297d877e070a", + "created": "2022-07-01T03:29:17.12789Z", + "modified": "2022-07-01T03:29:17.12789Z", + "name": "Prepare Assets Impersonating Legitimate Entities", + "description": "TA16", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-legitimacy" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0099.md", + "external_id": "T0099" + } + ], + "object_marking_refs": [ + "marking-definition--7238cf38-fabd-46b9-a27d-325688c423fe" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--ed11f144-9907-4dda-8d51-f9084227b41c", + "created_by_ref": "identity--1fdd359e-d9eb-42ef-851f-e8f7e907a990", + "created": "2022-07-01T03:29:17.128344Z", + "modified": "2022-07-01T03:29:17.128344Z", + "name": "Co-opt Trusted Sources", + "description": "TA16", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-legitimacy" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0100.md", + "external_id": "T0100" + } + ], + "object_marking_refs": [ + "marking-definition--06d3e445-3c4b-4a34-8641-98f8469a880c" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--7283861d-801a-40d3-8e63-fb2d9951fee6", + "created_by_ref": "identity--6d431156-2568-4a98-a905-75b4dc2ec0b8", + "created": "2022-07-01T03:29:17.12891Z", + "modified": "2022-07-01T03:29:17.12891Z", + "name": "Create Localized Content", + "description": "TA05", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "microtarget" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0101.md", + "external_id": "T0101" + } + ], + "object_marking_refs": [ + "marking-definition--4e4ef88f-e70b-4a42-99b7-9d6114c92124" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--fef87440-2f0d-4623-b952-04f8f6712938", + "created_by_ref": "identity--5c1d10e0-6bff-4f50-8d47-2ef9197c061c", + "created": "2022-07-01T03:29:17.129378Z", + "modified": "2022-07-01T03:29:17.129378Z", + "name": "Leverage Echo Chambers/Filter Bubbles", + "description": "TA05", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "microtarget" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0102.md", + "external_id": "T0102" + } + ], + "object_marking_refs": [ + "marking-definition--7996c25b-9633-4fa2-b7c0-1afd4aa59123" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--f7eb387d-dc29-4961-9aa5-2ef707ef4d4e", + "created_by_ref": "identity--02600a7a-9c21-4d6a-91bd-65d45451d843", + "created": "2022-07-01T03:29:17.129843Z", + "modified": "2022-07-01T03:29:17.129843Z", + "name": "Livestream", + "description": "TA07", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "select-channels-and-affordances" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0103.md", + "external_id": "T0103" + } + ], + "object_marking_refs": [ + "marking-definition--bf0180fb-de93-494f-805a-f3fceab6d48f" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--966328aa-86fd-4f90-85da-0685b146c1ac", + "created_by_ref": "identity--d103d1d9-e3c8-4796-903e-067a5d929aff", + "created": "2022-07-01T03:29:17.130301Z", + "modified": "2022-07-01T03:29:17.130301Z", + "name": "Social Networks", + "description": "TA07", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "select-channels-and-affordances" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0104.md", + "external_id": "T0104" + } + ], + "object_marking_refs": [ + "marking-definition--ad51d9d0-5a1c-4bd2-8bac-ccc2d5f01161" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--df56db91-8883-40b5-88d3-a144c2093f27", + "created_by_ref": "identity--350a4915-af5e-4bd0-a737-a79d6d5d527f", + "created": "2022-07-01T03:29:17.130762Z", + "modified": "2022-07-01T03:29:17.130762Z", + "name": "Media Sharing Networks", + "description": "TA07", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "select-channels-and-affordances" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0105.md", + "external_id": "T0105" + } + ], + "object_marking_refs": [ + "marking-definition--ad61e09c-a1f4-40b5-877c-2c9933937e24" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--fdd2573d-3ad7-4ae0-a0ff-7542978aa448", + "created_by_ref": "identity--86080875-4c7c-4777-bda0-b3493e0c2d02", + "created": "2022-07-01T03:29:17.13122Z", + "modified": "2022-07-01T03:29:17.13122Z", + "name": "Discussion Forums", + "description": "TA07", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "select-channels-and-affordances" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0106.md", + "external_id": "T0106" + } + ], + "object_marking_refs": [ + "marking-definition--c4cd66f6-9714-4a00-9007-5f5b13e547e2" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--99eb03c9-985f-4c62-9c07-d20939f7beb6", + "created_by_ref": "identity--c98c629f-8200-4d6c-bd09-efb9809fafd9", + "created": "2022-07-01T03:29:17.131683Z", + "modified": "2022-07-01T03:29:17.131683Z", + "name": "Bookmarking and Content Curation", + "description": "TA07", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "select-channels-and-affordances" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0107.md", + "external_id": "T0107" + } + ], + "object_marking_refs": [ + "marking-definition--b2249aa7-99b9-4ff6-8491-e806868349e5" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--06cfef07-9214-4df2-a401-84c040d3e062", + "created_by_ref": "identity--635e6fde-dc4a-4c1e-8423-251d86d1716e", + "created": "2022-07-01T03:29:17.132138Z", + "modified": "2022-07-01T03:29:17.132138Z", + "name": "Blogging and Publishing Networks", + "description": "TA07", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "select-channels-and-affordances" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0108.md", + "external_id": "T0108" + } + ], + "object_marking_refs": [ + "marking-definition--331b217d-fcf4-4a64-b4af-eb0f06c33825" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--970f3833-768b-4789-b6f3-8158c240e6c1", + "created_by_ref": "identity--4cae941b-6bdd-41bd-8c00-1231cf53eaef", + "created": "2022-07-01T03:29:17.132595Z", + "modified": "2022-07-01T03:29:17.132595Z", + "name": "Consumer Review Networks", + "description": "TA07", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "select-channels-and-affordances" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0109.md", + "external_id": "T0109" + } + ], + "object_marking_refs": [ + "marking-definition--19909584-6abf-42d1-985b-231aa5609359" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--89c58eaa-2973-4ce4-81b2-bc644d8dff02", + "created_by_ref": "identity--771e28f4-3218-4abb-b6bb-a27c787bdbfa", + "created": "2022-07-01T03:29:17.133055Z", + "modified": "2022-07-01T03:29:17.133055Z", + "name": "Formal Diplomatic Channels", + "description": "TA07", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "select-channels-and-affordances" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0110.md", + "external_id": "T0110" + } + ], + "object_marking_refs": [ + "marking-definition--871acae2-78f0-4ead-8a9e-b10689e07906" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--470a1d29-5132-4744-b5ed-fa2ab50973a3", + "created_by_ref": "identity--da0bc2f8-12e6-4ec3-9794-58ce6c5d2550", + "created": "2022-07-01T03:29:17.133515Z", + "modified": "2022-07-01T03:29:17.133515Z", + "name": "Traditional Media", + "description": "TA07", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "select-channels-and-affordances" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0111.md", + "external_id": "T0111" + } + ], + "object_marking_refs": [ + "marking-definition--4db91436-2db3-4a1e-89c6-80b0be3fcadb" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--2f468380-3519-45f0-b377-050df5af0316", + "created_by_ref": "identity--68496637-a6d4-4740-a8c6-4d9b0b688ad0", + "created": "2022-07-01T03:29:17.13397Z", + "modified": "2022-07-01T03:29:17.13397Z", + "name": "Email", + "description": "TA07", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "select-channels-and-affordances" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0112.md", + "external_id": "T0112" + } + ], + "object_marking_refs": [ + "marking-definition--048a31b3-4103-4c59-b29e-26adf227909c" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--5b44f922-66c0-4241-b933-4781edcbd457", + "created_by_ref": "identity--24d24d03-1356-4aee-a3da-4653eb081889", + "created": "2022-07-01T03:29:17.134421Z", + "modified": "2022-07-01T03:29:17.134421Z", + "name": "Employ Commercial Analytic Firms", + "description": "TA08", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "conduct-pump-priming" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0113.md", + "external_id": "T0113" + } + ], + "object_marking_refs": [ + "marking-definition--7cd3c8f4-122d-4262-9f63-a6e646f96fb5" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--501730c4-a597-4dfe-8487-688befb42b10", + "created_by_ref": "identity--e785f97d-e66a-4e3b-9d3d-dcb75ab307d8", + "created": "2022-07-01T03:29:17.134957Z", + "modified": "2022-07-01T03:29:17.134957Z", + "name": "Deliver Ads", + "description": "TA09", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "deliver-content" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0114.md", + "external_id": "T0114" + } + ], + "object_marking_refs": [ + "marking-definition--6206fbd9-5b7d-4101-9869-4a031afbe4df" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--bc6b823b-8a40-4ba3-99ab-0092341f2cc6", + "created_by_ref": "identity--147a00a2-3f5b-49ce-9d1e-78a6780d7d81", + "created": "2022-07-01T03:29:17.135439Z", + "modified": "2022-07-01T03:29:17.135439Z", + "name": "Post Content", + "description": "TA09", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "deliver-content" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0115.md", + "external_id": "T0115" + } + ], + "object_marking_refs": [ + "marking-definition--87fb19be-2eab-4cb0-92c0-950b415b07d2" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--55e306db-023f-4634-8e7a-d9f1753f1403", + "created_by_ref": "identity--4e65dc6d-3f43-4ea2-a633-6ea513b65471", + "created": "2022-07-01T03:29:17.1359Z", + "modified": "2022-07-01T03:29:17.1359Z", + "name": "Comment or Reply on Content", + "description": "TA09", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "deliver-content" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0116.md", + "external_id": "T0116" + } + ], + "object_marking_refs": [ + "marking-definition--1d1032b7-2302-4980-b4fa-0ddaca3c1fe8" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--c9156db4-b6b2-485b-bac1-a31516bea444", + "created_by_ref": "identity--2bef3f55-6ce0-44da-acde-3a7855a38291", + "created": "2022-07-01T03:29:17.136363Z", + "modified": "2022-07-01T03:29:17.136363Z", + "name": "Attract Traditional Media", + "description": "TA09", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "deliver-content" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0117.md", + "external_id": "T0117" + } + ], + "object_marking_refs": [ + "marking-definition--96aa2ed8-9c51-4307-88fc-441d79e72b72" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--37aed67a-9d72-4f4f-a44b-3dfb06995535", + "created_by_ref": "identity--00a115b8-decc-4ece-a2b4-752003ba4683", + "created": "2022-07-01T03:29:17.136819Z", + "modified": "2022-07-01T03:29:17.136819Z", + "name": "Amplify Existing Narrative", + "description": "TA17", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "maximize-exposure" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0118.md", + "external_id": "T0118" + } + ], + "object_marking_refs": [ + "marking-definition--00bcdef4-19d7-4556-ad99-237f7161a01f" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--0ab43e92-4882-457c-8ca6-c354ac48b294", + "created_by_ref": "identity--e6d8a95b-9b10-48ca-b8e1-b077500ec588", + "created": "2022-07-01T03:29:17.137316Z", + "modified": "2022-07-01T03:29:17.137316Z", + "name": "Cross-Posting", + "description": "TA17", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "maximize-exposure" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0119.md", + "external_id": "T0119" + } + ], + "object_marking_refs": [ + "marking-definition--16a6d36f-a149-4ed5-b05e-63ac6aaa928a" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--fb0fe94e-7214-4aed-a3b8-d8e21fe0f934", + "created_by_ref": "identity--9a50eaed-346d-429b-ab68-36d9d1883d71", + "created": "2022-07-01T03:29:17.137779Z", + "modified": "2022-07-01T03:29:17.137779Z", + "name": "Incentivize Sharing", + "description": "TA17", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "maximize-exposure" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0120.md", + "external_id": "T0120" + } + ], + "object_marking_refs": [ + "marking-definition--aac40058-3121-4869-9029-566b754482ea" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--0281663e-716f-41b1-be93-08f7bad1ddef", + "created_by_ref": "identity--c520075b-a92a-4f85-96fe-b724de95492a", + "created": "2022-07-01T03:29:17.138235Z", + "modified": "2022-07-01T03:29:17.138235Z", + "name": "Manipulate Platform Algorithm", + "description": "TA17", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "maximize-exposure" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0121.md", + "external_id": "T0121" + } + ], + "object_marking_refs": [ + "marking-definition--7a0da991-8525-4cd7-9707-546159b1d1c3" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--fb56da5b-2a04-4d5d-8399-97b7ac04525f", + "created_by_ref": "identity--01935b3a-243c-4232-8366-767df5ba5d9d", + "created": "2022-07-01T03:29:17.138696Z", + "modified": "2022-07-01T03:29:17.138696Z", + "name": "Direct Users to Alternative Platforms", + "description": "TA17", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "maximize-exposure" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0122.md", + "external_id": "T0122" + } + ], + "object_marking_refs": [ + "marking-definition--98150158-c209-40ef-8f67-8b0e068283dd" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--bd436c13-0ab4-4b4b-a845-ae87918a04e8", + "created_by_ref": "identity--dd4a264b-4dc5-4e7f-9cb1-41d62ff84fe4", + "created": "2022-07-01T03:29:17.139152Z", + "modified": "2022-07-01T03:29:17.139152Z", + "name": "Control Information Environment through Offensive Cyberspace Operations", + "description": "TA18", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "drive-online-harms" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0123.md", + "external_id": "T0123" + } + ], + "object_marking_refs": [ + "marking-definition--7ad306b6-8013-4090-b62a-ddad48b77c66" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--93c39fc5-412f-44b7-a1a1-badc8a1bca3a", + "created_by_ref": "identity--ff3177e1-cb74-49f6-92d9-9760994d1245", + "created": "2022-07-01T03:29:17.139611Z", + "modified": "2022-07-01T03:29:17.139611Z", + "name": "Suppress Opposition", + "description": "TA18", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "drive-online-harms" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0124.md", + "external_id": "T0124" + } + ], + "object_marking_refs": [ + "marking-definition--374994be-2311-4e29-91b4-8e46d3a733d6" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--eedcc7f8-edec-4edb-9b08-a890cf55c907", + "created_by_ref": "identity--7f51c314-3c76-4bb9-b1e9-c43a441088a9", + "created": "2022-07-01T03:29:17.140068Z", + "modified": "2022-07-01T03:29:17.140068Z", + "name": "Platform Filtering", + "description": "TA18", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "drive-online-harms" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0125.md", + "external_id": "T0125" + } + ], + "object_marking_refs": [ + "marking-definition--aec46781-a9af-4956-ac97-90805bdd57a2" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--5f3b98bc-bb23-495b-bb5f-d374cb552333", + "created_by_ref": "identity--04a2369c-c174-45ec-8f6c-bd86d4615e94", + "created": "2022-07-01T03:29:17.140525Z", + "modified": "2022-07-01T03:29:17.140525Z", + "name": "Encourage Attendance at Events", + "description": "TA10", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "drive-offline-activity" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0126.md", + "external_id": "T0126" + } + ], + "object_marking_refs": [ + "marking-definition--75b6f15e-0ebc-4023-8401-c77c43cad473" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--d529115b-3c95-42c2-bd2c-ca9f33aac00c", + "created_by_ref": "identity--b75c115a-736d-4f7e-b16e-2c77681d4355", + "created": "2022-07-01T03:29:17.140979Z", + "modified": "2022-07-01T03:29:17.140979Z", + "name": "Physical Violence", + "description": "TA10", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "drive-offline-activity" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0127.md", + "external_id": "T0127" + } + ], + "object_marking_refs": [ + "marking-definition--93c68e3b-9c3d-4734-8bc3-f5f15d277b97" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--055b0bf8-8474-488f-8e3d-52d947132649", + "created_by_ref": "identity--6754c7de-f65b-4c7a-ab0e-2f6898e78b9b", + "created": "2022-07-01T03:29:17.141434Z", + "modified": "2022-07-01T03:29:17.141434Z", + "name": "Conceal People", + "description": "TA11", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "persist-in-the-information-environment" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0128.md", + "external_id": "T0128" + } + ], + "object_marking_refs": [ + "marking-definition--ce3102d0-e888-457e-978c-080e0d170683" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--61f9d9e8-83c8-4eaa-b7c2-b7bba16b948b", + "created_by_ref": "identity--bddd29bc-196d-40b4-8c68-be85f2f68e35", + "created": "2022-07-01T03:29:17.14189Z", + "modified": "2022-07-01T03:29:17.14189Z", + "name": "Conceal Operational Activity", + "description": "TA11", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "persist-in-the-information-environment" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0129.md", + "external_id": "T0129" + } + ], + "object_marking_refs": [ + "marking-definition--4bfa250f-3859-47a6-b2aa-0a0feab550b8" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--e5ca8c74-3a97-449f-b2fd-a6c68001022e", + "created_by_ref": "identity--74764361-a0ca-4a61-b7c3-07f5589c908c", + "created": "2022-07-01T03:29:17.142343Z", + "modified": "2022-07-01T03:29:17.142343Z", + "name": "Conceal Infrastructure", + "description": "TA11", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "persist-in-the-information-environment" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0130.md", + "external_id": "T0130" + } + ], + "object_marking_refs": [ + "marking-definition--0732f928-a6d2-46c4-983f-f385a18d9c30" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--f8c2e933-a4ba-410a-8689-d6882b92e28c", + "created_by_ref": "identity--6d8fd8d9-aa56-4ae4-80fc-4a0ca136f567", + "created": "2022-07-01T03:29:17.1428Z", + "modified": "2022-07-01T03:29:17.1428Z", + "name": "Exploit TOS/Content Moderation", + "description": "TA11", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "persist-in-the-information-environment" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0131.md", + "external_id": "T0131" + } + ], + "object_marking_refs": [ + "marking-definition--3e99c627-a96e-4eef-9a2e-ce23c1e3895f" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--a0c6c1cb-b4b6-4f91-ba68-489a7fcf2b9b", + "created_by_ref": "identity--5bf5359f-d86d-462a-9231-ec13db821278", + "created": "2022-07-01T03:29:17.143249Z", + "modified": "2022-07-01T03:29:17.143249Z", + "name": "Measure Performance", + "description": "TA12", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "assess-effectiveness" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0132.md", + "external_id": "T0132" + } + ], + "object_marking_refs": [ + "marking-definition--7006fd01-2469-4378-8f80-02f3b2632f4d" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--0503f142-a258-45ee-8c51-4ec589ec4d26", + "created_by_ref": "identity--f26d6354-06a8-49af-a6ab-35b84e3aaafa", + "created": "2022-07-01T03:29:17.143701Z", + "modified": "2022-07-01T03:29:17.143701Z", + "name": "Measure Effectiveness", + "description": "TA12", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "assess-effectiveness" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0133.md", + "external_id": "T0133" + } + ], + "object_marking_refs": [ + "marking-definition--9a5ed9b1-4394-4791-be2a-8ee409828b58" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + }, + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--7cb970a6-d4bb-43be-ac7f-92a1b3eb24ef", + "created_by_ref": "identity--34d1bc62-7da2-4c56-b1c5-320c7cd9f44f", + "created": "2022-07-01T03:29:17.144152Z", + "modified": "2022-07-01T03:29:17.144152Z", + "name": "Measure Effectiveness Indicators (or KPIs)", + "description": "TA12", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "assess-effectiveness" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0134.md", + "external_id": "T0134" + } + ], + "object_marking_refs": [ + "marking-definition--4f5f5cd0-90a6-4338-beaf-441168ca9303" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ @@ -2621,25 +3575,28 @@ { "type": "x-mitre-matrix", "spec_version": "2.1", - "id": "x-mitre-matrix--efa3ff0a-9e96-44ba-9a87-f46cc11a01c4", - "created": "2022-06-29T15:07:39.674372Z", - "modified": "2022-06-29T15:07:39.674372Z", + "id": "x-mitre-matrix--4592a0a9-b821-47ad-b0c6-5ce63c628719", + "created": "2022-07-01T03:29:17.144346Z", + "modified": "2022-07-01T03:29:17.144346Z", "name": "DISARM Framework", "description": "DISARM is a framework designed for describing and understanding disinformation incidents.", "tactic_refs": [ - "x-mitre-tactic--45968fd4-4fdb-4ba2-82e1-f5e5c148e325", - "x-mitre-tactic--2f02c1ff-9e62-469c-a8bf-d9a6b1cc7917", - "x-mitre-tactic--49b9b288-58bb-41b8-b2b7-570e10025264", - "x-mitre-tactic--f2d0efbf-0f86-419b-917b-2f3dc904094d", - "x-mitre-tactic--a9cc9713-f33b-44a8-868b-c59950406f76", - "x-mitre-tactic--6c6c13f5-aa72-42e5-a9d2-4700306c353e", - "x-mitre-tactic--5c04a4d3-dd32-458b-952e-1e05f2861cbd", - "x-mitre-tactic--ddb9dd2f-6a39-46e8-9b3c-a25c12cef614", - "x-mitre-tactic--ede1dc9b-6afa-46d1-a42c-6b3e791bc1eb", - "x-mitre-tactic--66b91148-79b6-472f-b48b-5c74113088dc", - "x-mitre-tactic--81feb109-6d02-468e-bd47-006ce9d9aafa", - "x-mitre-tactic--898251e6-a030-4ff1-8037-2c4b49e85ed3", - "x-mitre-tactic--6a8a5578-8e24-4599-b5ce-556f207927c7" + "x-mitre-tactic--ca848c76-3e2e-4059-a61f-dce4180b4710", + "x-mitre-tactic--eec7c49a-35c0-4ed2-9161-f7dba316a609", + "x-mitre-tactic--e749a24c-8362-4fed-ba26-51e56b37b439", + "x-mitre-tactic--4348a49d-d21a-4915-a512-ba1accaa8cd9", + "x-mitre-tactic--7c9b3fa5-50f8-4fab-acc3-f984b7290cd7", + "x-mitre-tactic--f59414c8-2d4d-4d9e-8d88-fe8a339270d1", + "x-mitre-tactic--717ccb01-df67-48a8-b6ec-9551272a4ff4", + "x-mitre-tactic--b2ad03fa-b162-4161-b864-344f9cb69ad3", + "x-mitre-tactic--efddae0c-df65-48be-a7a4-067237d8a528", + "x-mitre-tactic--96ec7676-22a8-40f8-91f9-2b770fec3a78", + "x-mitre-tactic--10b904db-7568-4a50-bf6f-9541f3b01924", + "x-mitre-tactic--977b0d14-c42a-4f3e-badb-fdabb9781544", + "x-mitre-tactic--5d068e30-413a-4465-b51b-8e9fc1e18b1e", + "x-mitre-tactic--60087ffe-9390-4baf-8e93-20b3f075da8e", + "x-mitre-tactic--c4e65fa5-4f02-4075-b26f-07c0d07badaa", + "x-mitre-tactic--2fad8829-108a-4d6a-8135-6bc3bf74a770" ], "external_references": [ { diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0281663e-716f-41b1-be93-08f7bad1ddef.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0281663e-716f-41b1-be93-08f7bad1ddef.json new file mode 100644 index 0000000..1f80bc4 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0281663e-716f-41b1-be93-08f7bad1ddef.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--68cf09f7-8c99-4ce1-bf2e-01aa82bd032d", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--0281663e-716f-41b1-be93-08f7bad1ddef", + "created_by_ref": "identity--c520075b-a92a-4f85-96fe-b724de95492a", + "created": "2022-07-01T03:29:17.138235Z", + "modified": "2022-07-01T03:29:17.138235Z", + "name": "Manipulate Platform Algorithm", + "description": "TA17", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "maximize-exposure" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0121.md", + "external_id": "T0121" + } + ], + "object_marking_refs": [ + "marking-definition--7a0da991-8525-4cd7-9707-546159b1d1c3" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3491ca2c-d41c-441e-8f25-6b095b045eec.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0503f142-a258-45ee-8c51-4ec589ec4d26.json similarity index 56% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--3491ca2c-d41c-441e-8f25-6b095b045eec.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--0503f142-a258-45ee-8c51-4ec589ec4d26.json index 953e997..1b27ccb 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3491ca2c-d41c-441e-8f25-6b095b045eec.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0503f142-a258-45ee-8c51-4ec589ec4d26.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--3239993a-f7f2-488e-abd8-93e0566f6824", + "id": "bundle--b9c8cc48-7a72-4469-beda-b1985e4f132f", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--3491ca2c-d41c-441e-8f25-6b095b045eec", - "created_by_ref": "identity--64060b20-48ea-4363-93c4-b0595d45008b", - "created": "2022-06-29T15:07:39.665912Z", - "modified": "2022-06-29T15:07:39.665912Z", - "name": "Behaviour changes", + "id": "attack-pattern--0503f142-a258-45ee-8c51-4ec589ec4d26", + "created_by_ref": "identity--f26d6354-06a8-49af-a6ab-35b84e3aaafa", + "created": "2022-07-01T03:29:17.143701Z", + "modified": "2022-07-01T03:29:17.143701Z", + "name": "Measure Effectiveness", "description": "TA12", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "measure-effectiveness" + "phase_name": "assess-effectiveness" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0062.md", - "external_id": "T0062" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0133.md", + "external_id": "T0133" } ], "object_marking_refs": [ - "marking-definition--7b816be9-3a03-4d91-b131-4da2f4a392c4" + "marking-definition--9a5ed9b1-4394-4791-be2a-8ee409828b58" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b87a6150-0913-4161-b6f2-190881a12058.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--055b0bf8-8474-488f-8e3d-52d947132649.json similarity index 56% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--b87a6150-0913-4161-b6f2-190881a12058.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--055b0bf8-8474-488f-8e3d-52d947132649.json index 8deb876..8286798 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b87a6150-0913-4161-b6f2-190881a12058.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--055b0bf8-8474-488f-8e3d-52d947132649.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--84c64705-9d67-477c-9484-97dc1346358f", + "id": "bundle--7e7da140-1759-4a91-9a68-a9dbd7668a37", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--b87a6150-0913-4161-b6f2-190881a12058", - "created_by_ref": "identity--7d23cd01-4491-4667-99c8-e48e5fda3a57", - "created": "2022-06-29T15:07:39.662167Z", - "modified": "2022-06-29T15:07:39.662167Z", - "name": "Legacy web content", + "id": "attack-pattern--055b0bf8-8474-488f-8e3d-52d947132649", + "created_by_ref": "identity--6754c7de-f65b-4c7a-ab0e-2f6898e78b9b", + "created": "2022-07-01T03:29:17.141434Z", + "modified": "2022-07-01T03:29:17.141434Z", + "name": "Conceal People", "description": "TA11", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "persistence" + "phase_name": "persist-in-the-information-environment" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0058.md", - "external_id": "T0058" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0128.md", + "external_id": "T0128" } ], "object_marking_refs": [ - "marking-definition--c00b8748-a8cb-49d9-aa00-ce0d55d185a4" + "marking-definition--ce3102d0-e888-457e-978c-080e0d170683" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4ccf7878-ca79-443a-bc53-dbc5a32cdca5.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0590dab3-9ceb-4b71-9187-8847ed98f0c5.json similarity index 67% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--4ccf7878-ca79-443a-bc53-dbc5a32cdca5.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--0590dab3-9ceb-4b71-9187-8847ed98f0c5.json index 4215605..ef3e997 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4ccf7878-ca79-443a-bc53-dbc5a32cdca5.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0590dab3-9ceb-4b71-9187-8847ed98f0c5.json @@ -1,15 +1,15 @@ { "type": "bundle", - "id": "bundle--5bcb4ba7-9eb1-4c9c-a12a-d049b88bbff6", + "id": "bundle--f4acc6a2-b82a-47aa-8435-4b20adbbd1d8", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--4ccf7878-ca79-443a-bc53-dbc5a32cdca5", - "created_by_ref": "identity--081e355e-4913-403b-b5b0-2decfe75acb2", - "created": "2022-06-29T15:07:39.664619Z", - "modified": "2022-06-29T15:07:39.664619Z", - "name": "Sell merchandising", + "id": "attack-pattern--0590dab3-9ceb-4b71-9187-8847ed98f0c5", + "created_by_ref": "identity--81fccebf-8fd2-4369-b6d8-eb7bc5a94dc4", + "created": "2022-07-01T03:29:17.113675Z", + "modified": "2022-07-01T03:29:17.113675Z", + "name": "Sell Merchandise", "description": "TA10", "kill_chain_phases": [ { @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--985e7b21-f851-4d00-a243-81ae85893185" + "marking-definition--ef2c3e54-f8ba-4edc-8460-be63c6cfc8c7" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--06cfef07-9214-4df2-a401-84c040d3e062.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--06cfef07-9214-4df2-a401-84c040d3e062.json new file mode 100644 index 0000000..ecb99b6 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--06cfef07-9214-4df2-a401-84c040d3e062.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--46b85fb0-7aa0-47ff-a414-65fd582bb2df", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--06cfef07-9214-4df2-a401-84c040d3e062", + "created_by_ref": "identity--635e6fde-dc4a-4c1e-8423-251d86d1716e", + "created": "2022-07-01T03:29:17.132138Z", + "modified": "2022-07-01T03:29:17.132138Z", + "name": "Blogging and Publishing Networks", + "description": "TA07", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "select-channels-and-affordances" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0108.md", + "external_id": "T0108" + } + ], + "object_marking_refs": [ + "marking-definition--331b217d-fcf4-4a64-b4af-eb0f06c33825" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--06e0e6e4-1c50-4813-9ff3-f49592514ab8.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--06e0e6e4-1c50-4813-9ff3-f49592514ab8.json new file mode 100644 index 0000000..e097fcd --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--06e0e6e4-1c50-4813-9ff3-f49592514ab8.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--27e7e67e-073f-40db-80a3-9e6a3665b34b", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--06e0e6e4-1c50-4813-9ff3-f49592514ab8", + "created_by_ref": "identity--1436a742-18aa-4755-a263-57093176e4e9", + "created": "2022-07-01T03:29:17.119621Z", + "modified": "2022-07-01T03:29:17.119621Z", + "name": "Identify Social and Technical Vulnerabilities", + "description": "TA13", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "target-audience-analysis" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0081.md", + "external_id": "T0081" + } + ], + "object_marking_refs": [ + "marking-definition--897d9914-1f35-4b99-8192-8bc918077f22" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ee02b052-755c-4e8a-ad6d-7bab7ec88a84.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--08850f6c-e006-4c4f-886b-c904d8fb77f5.json similarity index 65% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--ee02b052-755c-4e8a-ad6d-7bab7ec88a84.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--08850f6c-e006-4c4f-886b-c904d8fb77f5.json index 6339405..bf5a5bc 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ee02b052-755c-4e8a-ad6d-7bab7ec88a84.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--08850f6c-e006-4c4f-886b-c904d8fb77f5.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--e9f825b1-8621-4192-a892-bdada9617167", + "id": "bundle--55f4e060-01f4-438a-a146-92827205f3ac", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--ee02b052-755c-4e8a-ad6d-7bab7ec88a84", - "created_by_ref": "identity--bc243e05-9718-4edf-bbca-4af2b8b29971", - "created": "2022-06-29T15:07:39.662962Z", - "modified": "2022-06-29T15:07:39.662962Z", + "id": "attack-pattern--08850f6c-e006-4c4f-886b-c904d8fb77f5", + "created_by_ref": "identity--2f19463e-0d5e-4578-a45f-ecef828a771b", + "created": "2022-07-01T03:29:17.11275Z", + "modified": "2022-07-01T03:29:17.11275Z", "name": "Play the long game", "description": "TA11", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "persistence" + "phase_name": "persist-in-the-information-environment" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--16114ef5-a787-4b4a-8736-5198f48011c4" + "marking-definition--02d2bd8f-5650-473c-b7b8-7c42a13c9820" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0ab43e92-4882-457c-8ca6-c354ac48b294.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0ab43e92-4882-457c-8ca6-c354ac48b294.json new file mode 100644 index 0000000..52a9974 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0ab43e92-4882-457c-8ca6-c354ac48b294.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--a29f8f13-74f4-4a95-903d-f25741a4c992", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--0ab43e92-4882-457c-8ca6-c354ac48b294", + "created_by_ref": "identity--e6d8a95b-9b10-48ca-b8e1-b077500ec588", + "created": "2022-07-01T03:29:17.137316Z", + "modified": "2022-07-01T03:29:17.137316Z", + "name": "Cross-Posting", + "description": "TA17", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "maximize-exposure" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0119.md", + "external_id": "T0119" + } + ], + "object_marking_refs": [ + "marking-definition--16a6d36f-a149-4ed5-b05e-63ac6aaa928a" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3359ff9e-860e-46e0-9d87-11f47b2ae40d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0f8410d6-0ede-4e4f-8b70-d8a6821d25b0.json similarity index 60% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--3359ff9e-860e-46e0-9d87-11f47b2ae40d.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--0f8410d6-0ede-4e4f-8b70-d8a6821d25b0.json index b453e45..55a4113 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3359ff9e-860e-46e0-9d87-11f47b2ae40d.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0f8410d6-0ede-4e4f-8b70-d8a6821d25b0.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--2eede106-4cd0-45ff-861c-2e9297b3f728", + "id": "bundle--09327545-6c93-4c4d-a2e5-92ad87adc0f2", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--3359ff9e-860e-46e0-9d87-11f47b2ae40d", - "created_by_ref": "identity--aceeab73-113b-4587-bf35-2795fa74fdc9", - "created": "2022-06-29T15:07:39.622326Z", - "modified": "2022-06-29T15:07:39.622326Z", - "name": "Create hashtags", - "description": "TA04", + "id": "attack-pattern--0f8410d6-0ede-4e4f-8b70-d8a6821d25b0", + "created_by_ref": "identity--ba81db1f-626f-46c3-bb99-f88a11819af7", + "created": "2022-07-01T03:29:17.103569Z", + "modified": "2022-07-01T03:29:17.103569Z", + "name": "Create hashtags and search artifacts", + "description": "TA06", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-networks" + "phase_name": "develop-content" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--85e1c7bf-fe4a-4c4e-bd0c-08cae90a8e47" + "marking-definition--e25c36d4-b84a-48e3-9d85-8cd8b333f755" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3075bb6b-39fc-4320-8bd9-1b2a1429928a.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--10d0a71b-b7b0-4b59-812b-6a9f859094b1.json similarity index 59% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--3075bb6b-39fc-4320-8bd9-1b2a1429928a.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--10d0a71b-b7b0-4b59-812b-6a9f859094b1.json index bd09b6b..e97a43b 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--3075bb6b-39fc-4320-8bd9-1b2a1429928a.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--10d0a71b-b7b0-4b59-812b-6a9f859094b1.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--a9713f5a-a107-4713-b296-c7128cb0a4d9", + "id": "bundle--f0219593-765f-4167-954c-66ef6a9a3bdf", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--3075bb6b-39fc-4320-8bd9-1b2a1429928a", - "created_by_ref": "identity--46595ce7-1bfe-4523-8102-88996c6e005a", - "created": "2022-06-29T15:07:39.615253Z", - "modified": "2022-06-29T15:07:39.615253Z", - "name": "Create fake Social Media Profiles / Pages / Groups", - "description": "TA03", + "id": "attack-pattern--10d0a71b-b7b0-4b59-812b-6a9f859094b1", + "created_by_ref": "identity--949ff029-9578-4d91-8428-1f38178d59b2", + "created": "2022-07-01T03:29:17.100806Z", + "modified": "2022-07-01T03:29:17.100806Z", + "name": "Create Inauthentic Social Media Pages and Groups", + "description": "TA15", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-people" + "phase_name": "establish-social-assets" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--26898b49-7e32-471b-8ffa-1e01b3060d44" + "marking-definition--d545e516-526f-47bc-a99e-3aa1cac2287a" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--cde7dc89-06fc-4b39-8f28-953ca75817b6.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1397f207-ad1b-4398-9d06-ed36393d53fa.json similarity index 60% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--cde7dc89-06fc-4b39-8f28-953ca75817b6.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--1397f207-ad1b-4398-9d06-ed36393d53fa.json index cdb8afc..b5f028c 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--cde7dc89-06fc-4b39-8f28-953ca75817b6.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1397f207-ad1b-4398-9d06-ed36393d53fa.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--634fe496-44bc-4c84-b372-b02544072ba6", + "id": "bundle--8e7cf2d5-14d1-4929-b03c-b3fae422914e", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--cde7dc89-06fc-4b39-8f28-953ca75817b6", - "created_by_ref": "identity--819423c4-fd86-4ade-b7ce-0ddc03fc43e9", - "created": "2022-06-29T15:07:39.620326Z", - "modified": "2022-06-29T15:07:39.620326Z", - "name": "Create fake websites", - "description": "TA04", + "id": "attack-pattern--1397f207-ad1b-4398-9d06-ed36393d53fa", + "created_by_ref": "identity--e7a9ac1f-d1b0-4a3f-af61-e546ca3ae445", + "created": "2022-07-01T03:29:17.102645Z", + "modified": "2022-07-01T03:29:17.102645Z", + "name": "Create inauthentic websites", + "description": "TA15", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-networks" + "phase_name": "establish-social-assets" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--8b11efad-8eb5-4f7b-95d4-462fb516d4e5" + "marking-definition--c91f7963-b220-47db-8707-c034998735ce" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--40c5fb5f-3b61-44ed-9f9d-206b26fda76c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--156bbbf4-8f8a-44f3-9533-af5118313265.json similarity index 56% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--40c5fb5f-3b61-44ed-9f9d-206b26fda76c.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--156bbbf4-8f8a-44f3-9533-af5118313265.json index e389648..f8be3bf 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--40c5fb5f-3b61-44ed-9f9d-206b26fda76c.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--156bbbf4-8f8a-44f3-9533-af5118313265.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--31229f59-ab58-40a5-8d6f-1fbedd3c3cca", + "id": "bundle--d8afc260-2a15-481d-8c0e-ff0bbc43cb37", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--40c5fb5f-3b61-44ed-9f9d-206b26fda76c", - "created_by_ref": "identity--b9e7689b-2823-42f4-9d4e-87e719780725", - "created": "2022-06-29T15:07:39.671351Z", - "modified": "2022-06-29T15:07:39.671351Z", - "name": "Respond to active crisis", + "id": "attack-pattern--156bbbf4-8f8a-44f3-9533-af5118313265", + "created_by_ref": "identity--0fbb6aa3-5a2c-4965-bad7-e1a009a30414", + "created": "2022-07-01T03:29:17.118259Z", + "modified": "2022-07-01T03:29:17.118259Z", + "name": "Dismay", "description": "TA02", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "objective-planning" + "phase_name": "plan-objectives" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0069.md", - "external_id": "T0069" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0078.md", + "external_id": "T0078" } ], "object_marking_refs": [ - "marking-definition--f54a004d-60a8-4869-8458-0eea4167d0d2" + "marking-definition--0745cf80-2737-42fc-8f9d-816fb5e54dfd" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--17f077e3-6308-4266-9f63-06d69db6fb45.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--17f077e3-6308-4266-9f63-06d69db6fb45.json new file mode 100644 index 0000000..c490231 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--17f077e3-6308-4266-9f63-06d69db6fb45.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--9fee2cf9-1ea2-4586-9221-2633929008de", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--17f077e3-6308-4266-9f63-06d69db6fb45", + "created_by_ref": "identity--2c304336-3c15-47fb-929a-26b00f4d0b65", + "created": "2022-07-01T03:29:17.120528Z", + "modified": "2022-07-01T03:29:17.120528Z", + "name": "Integrate Target Audience Vulnerabilities into Narrative", + "description": "TA14", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "develop-narratives" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0083.md", + "external_id": "T0083" + } + ], + "object_marking_refs": [ + "marking-definition--273d5ee8-e85f-451f-9fa3-466df09eae72" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1bd1d867-a9bc-46ee-8b3b-d8907ecb4986.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--21c051ac-c395-4ac0-a064-f97aff09639b.json similarity index 63% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--1bd1d867-a9bc-46ee-8b3b-d8907ecb4986.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--21c051ac-c395-4ac0-a064-f97aff09639b.json index 343d859..f0f1623 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1bd1d867-a9bc-46ee-8b3b-d8907ecb4986.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--21c051ac-c395-4ac0-a064-f97aff09639b.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--2a9def55-ea7c-4534-a91d-91a2e91ecb17", + "id": "bundle--64123f0a-bb8e-4536-b47e-13b0ddc3a3b2", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--1bd1d867-a9bc-46ee-8b3b-d8907ecb4986", - "created_by_ref": "identity--eb576670-0d92-489f-8bb8-ca4af90bc1ff", - "created": "2022-06-29T15:07:39.674013Z", - "modified": "2022-06-29T15:07:39.674013Z", - "name": "Segment audiences", + "id": "attack-pattern--21c051ac-c395-4ac0-a064-f97aff09639b", + "created_by_ref": "identity--66aa20b5-b271-42ea-b341-498721a297b4", + "created": "2022-07-01T03:29:17.115517Z", + "modified": "2022-07-01T03:29:17.115517Z", + "name": "Segment Audiences", "description": "TA13", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "conduct-center-of-gravity-analysis" + "phase_name": "target-audience-analysis" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--9d95da9e-41d5-4ca6-9230-3afda70cca8f" + "marking-definition--fbb99453-572c-48a8-a6f6-b7d63530c287" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--90cf47b9-d7a8-4305-b5d2-43c96a27033a.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2f468380-3519-45f0-b377-050df5af0316.json similarity index 56% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--90cf47b9-d7a8-4305-b5d2-43c96a27033a.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--2f468380-3519-45f0-b377-050df5af0316.json index b5eacde..491c9ab 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--90cf47b9-d7a8-4305-b5d2-43c96a27033a.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--2f468380-3519-45f0-b377-050df5af0316.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--3accef29-7a97-47f2-8336-0e524880b8de", + "id": "bundle--012437db-bbef-4198-a7a8-953edde7bd00", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--90cf47b9-d7a8-4305-b5d2-43c96a27033a", - "created_by_ref": "identity--e89f1e4c-34c5-488b-b2f8-ef37beb05b7a", - "created": "2022-06-29T15:07:39.637902Z", - "modified": "2022-06-29T15:07:39.637902Z", - "name": "Reddit", + "id": "attack-pattern--2f468380-3519-45f0-b377-050df5af0316", + "created_by_ref": "identity--68496637-a6d4-4740-a8c6-4d9b0b688ad0", + "created": "2022-07-01T03:29:17.13397Z", + "modified": "2022-07-01T03:29:17.13397Z", + "name": "Email", "description": "TA07", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" + "phase_name": "select-channels-and-affordances" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0032.md", - "external_id": "T0032" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0112.md", + "external_id": "T0112" } ], "object_marking_refs": [ - "marking-definition--42473975-0d38-41eb-82c1-0b8c7a87bd2f" + "marking-definition--048a31b3-4103-4c59-b29e-26adf227909c" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--efb40471-8eff-4649-8809-e590a2662d10.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--33acdd6d-93eb-4aaf-9e00-4691814bcc88.json similarity index 71% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--efb40471-8eff-4649-8809-e590a2662d10.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--33acdd6d-93eb-4aaf-9e00-4691814bcc88.json index a0b230d..fce1dd7 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--efb40471-8eff-4649-8809-e590a2662d10.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--33acdd6d-93eb-4aaf-9e00-4691814bcc88.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--a1d26b95-e58d-4895-9f64-ba6c7586d5f6", + "id": "bundle--26804296-a865-495a-85da-4d9c0062cb89", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--efb40471-8eff-4649-8809-e590a2662d10", - "created_by_ref": "identity--5898fcca-b1dd-4a89-8fdf-aa85bf426db3", - "created": "2022-06-29T15:07:39.62625Z", - "modified": "2022-06-29T15:07:39.62625Z", + "id": "attack-pattern--33acdd6d-93eb-4aaf-9e00-4691814bcc88", + "created_by_ref": "identity--c67ea4eb-798d-43ad-b13e-b10aedfd81a2", + "created": "2022-07-01T03:29:17.105397Z", + "modified": "2022-07-01T03:29:17.105397Z", "name": "Generate information pollution", "description": "TA06", "kill_chain_phases": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--a608bd3b-cb2c-4b23-8f4c-a9de74e01498" + "marking-definition--c157d07b-43b6-4b2f-aee8-a335fef9a052" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f00125d7-2219-4a89-8219-69e4c76b085b.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--36f2f883-c35e-49e4-8908-7002029f200a.json similarity index 56% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--f00125d7-2219-4a89-8219-69e4c76b085b.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--36f2f883-c35e-49e4-8908-7002029f200a.json index e26c5fc..00e971b 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f00125d7-2219-4a89-8219-69e4c76b085b.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--36f2f883-c35e-49e4-8908-7002029f200a.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--a2a9e4d7-fb90-45b0-b22a-8f51b7873f6f", + "id": "bundle--3e4c3b51-3b05-45e4-a5e7-d1bf9e5efd88", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--f00125d7-2219-4a89-8219-69e4c76b085b", - "created_by_ref": "identity--1ae777f7-6354-4a8e-8809-44380eb3ec9f", - "created": "2022-06-29T15:07:39.614322Z", - "modified": "2022-06-29T15:07:39.614322Z", - "name": "Develop Narrative Concepts", + "id": "attack-pattern--36f2f883-c35e-49e4-8908-7002029f200a", + "created_by_ref": "identity--435d8bae-f490-434e-ae08-a769da31c9ff", + "created": "2022-07-01T03:29:17.117339Z", + "modified": "2022-07-01T03:29:17.117339Z", + "name": "Distort", "description": "TA02", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "objective-planning" + "phase_name": "plan-objectives" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0006.md", - "external_id": "T0006" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0076.md", + "external_id": "T0076" } ], "object_marking_refs": [ - "marking-definition--7d2a1f26-30e1-42a1-8d6c-19bdeb0a012b" + "marking-definition--436a148e-4689-48bf-bfee-44345ad7b74d" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--378c1a19-24f1-466d-a5f8-93457ca0b89c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--378c1a19-24f1-466d-a5f8-93457ca0b89c.json new file mode 100644 index 0000000..690542f --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--378c1a19-24f1-466d-a5f8-93457ca0b89c.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--5c709091-b16e-404b-b397-143d355dd1b3", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--378c1a19-24f1-466d-a5f8-93457ca0b89c", + "created_by_ref": "identity--a13afd19-3282-4cee-9704-a69dae1249b8", + "created": "2022-07-01T03:29:17.124689Z", + "modified": "2022-07-01T03:29:17.124689Z", + "name": "Build Network", + "description": "TA15", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-social-assets" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0092.md", + "external_id": "T0092" + } + ], + "object_marking_refs": [ + "marking-definition--249a4868-99f9-4e0b-be59-7925d3d061b9" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--37aed67a-9d72-4f4f-a44b-3dfb06995535.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--37aed67a-9d72-4f4f-a44b-3dfb06995535.json new file mode 100644 index 0000000..f2621e8 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--37aed67a-9d72-4f4f-a44b-3dfb06995535.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--71e196d0-b8ab-4d58-840e-75be3d40ab29", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--37aed67a-9d72-4f4f-a44b-3dfb06995535", + "created_by_ref": "identity--00a115b8-decc-4ece-a2b4-752003ba4683", + "created": "2022-07-01T03:29:17.136819Z", + "modified": "2022-07-01T03:29:17.136819Z", + "name": "Amplify Existing Narrative", + "description": "TA17", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "maximize-exposure" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0118.md", + "external_id": "T0118" + } + ], + "object_marking_refs": [ + "marking-definition--00bcdef4-19d7-4556-ad99-237f7161a01f" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--40e9751b-4af7-4433-936f-ba4c04c03a0a.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--40e9751b-4af7-4433-936f-ba4c04c03a0a.json deleted file mode 100644 index 0a0b1c1..0000000 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--40e9751b-4af7-4433-936f-ba4c04c03a0a.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--cea3eef0-0f80-429e-ba23-cb17b582eb05", - "objects": [ - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--40e9751b-4af7-4433-936f-ba4c04c03a0a", - "created_by_ref": "identity--dd806483-fcc5-4f59-bbf3-f93289e01791", - "created": "2022-06-29T15:07:39.657442Z", - "modified": "2022-06-29T15:07:39.657442Z", - "name": "Twitter trolls amplify and manipulate", - "description": "TA09", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "exposure" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0053.md", - "external_id": "T0053" - } - ], - "object_marking_refs": [ - "marking-definition--f93162c6-e04b-4252-82e6-d663c85d0d1a" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - } - ] -} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--41cd20d5-2365-446a-bd9d-5756ff5f5986.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--41cd20d5-2365-446a-bd9d-5756ff5f5986.json new file mode 100644 index 0000000..59fed8a --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--41cd20d5-2365-446a-bd9d-5756ff5f5986.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--1e1b2d79-f5af-4885-a978-1f90bc5033ba", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--41cd20d5-2365-446a-bd9d-5756ff5f5986", + "created_by_ref": "identity--a8bb5ff1-6d2f-4d1f-901d-77eb1c1cd8d8", + "created": "2022-07-01T03:29:17.122352Z", + "modified": "2022-07-01T03:29:17.122352Z", + "name": "Develop Video-based Content", + "description": "TA06", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "develop-content" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0087.md", + "external_id": "T0087" + } + ], + "object_marking_refs": [ + "marking-definition--59edea27-8e32-4551-81f0-7406355eb952" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--470a1d29-5132-4744-b5ed-fa2ab50973a3.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--470a1d29-5132-4744-b5ed-fa2ab50973a3.json new file mode 100644 index 0000000..8188a8a --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--470a1d29-5132-4744-b5ed-fa2ab50973a3.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--22ae9f98-6a5f-416e-b979-5277ad76771c", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--470a1d29-5132-4744-b5ed-fa2ab50973a3", + "created_by_ref": "identity--da0bc2f8-12e6-4ec3-9794-58ce6c5d2550", + "created": "2022-07-01T03:29:17.133515Z", + "modified": "2022-07-01T03:29:17.133515Z", + "name": "Traditional Media", + "description": "TA07", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "select-channels-and-affordances" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0111.md", + "external_id": "T0111" + } + ], + "object_marking_refs": [ + "marking-definition--4db91436-2db3-4a1e-89c6-80b0be3fcadb" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b26a909a-26cf-475a-9073-cd1c05a6666e.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--474442df-9662-4d6a-8936-1bf7a71f4118.json similarity index 61% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--b26a909a-26cf-475a-9073-cd1c05a6666e.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--474442df-9662-4d6a-8936-1bf7a71f4118.json index 6a20c5a..f042c16 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b26a909a-26cf-475a-9073-cd1c05a6666e.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--474442df-9662-4d6a-8936-1bf7a71f4118.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--60845626-4ff5-490c-be88-2dc422aa0f31", + "id": "bundle--7bb040ee-22a5-415c-a713-7212cd469043", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--b26a909a-26cf-475a-9073-cd1c05a6666e", - "created_by_ref": "identity--fcd733c4-48df-46d7-ae37-faa74290cd9b", - "created": "2022-06-29T15:07:39.648402Z", - "modified": "2022-06-29T15:07:39.648402Z", - "name": "Use SMS/ WhatsApp/ Chat apps", - "description": "TA08", + "id": "attack-pattern--474442df-9662-4d6a-8936-1bf7a71f4118", + "created_by_ref": "identity--3d6ad857-87da-4328-b5bb-734f0be9f047", + "created": "2022-07-01T03:29:17.109075Z", + "modified": "2022-07-01T03:29:17.109075Z", + "name": "Chat apps", + "description": "TA07", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "pump-priming" + "phase_name": "select-channels-and-affordances" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--11403d9c-d1ed-4ef4-add4-f556a75e91db" + "marking-definition--f00e21f3-820b-458d-a385-e8cb7cec337c" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4ccec7a7-945f-40c2-8b51-a5701ae8aa14.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4ccec7a7-945f-40c2-8b51-a5701ae8aa14.json new file mode 100644 index 0000000..34ee505 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4ccec7a7-945f-40c2-8b51-a5701ae8aa14.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--2a9d4a56-de0a-4b29-a00a-3d15e6ab5c38", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--4ccec7a7-945f-40c2-8b51-a5701ae8aa14", + "created_by_ref": "identity--799d635e-d062-4488-aaa4-ab32cd1763da", + "created": "2022-07-01T03:29:17.125607Z", + "modified": "2022-07-01T03:29:17.125607Z", + "name": "Infiltrate Existing Networks", + "description": "TA15", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-social-assets" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0094.md", + "external_id": "T0094" + } + ], + "object_marking_refs": [ + "marking-definition--7200a735-ad5b-4c08-ad3e-07d725a7faac" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e7bf113f-c6a4-4e72-ba77-bc654347ec2d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4e5ff619-85fd-4d36-a3c4-9a400c8cbfe5.json similarity index 64% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--e7bf113f-c6a4-4e72-ba77-bc654347ec2d.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--4e5ff619-85fd-4d36-a3c4-9a400c8cbfe5.json index b824f19..486977a 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e7bf113f-c6a4-4e72-ba77-bc654347ec2d.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4e5ff619-85fd-4d36-a3c4-9a400c8cbfe5.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--214d0f7a-d478-425f-9849-c3093e132d32", + "id": "bundle--5eb84aa3-d49d-4b27-b378-682403f00f13", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--e7bf113f-c6a4-4e72-ba77-bc654347ec2d", - "created_by_ref": "identity--b481df8f-c7e0-4bfa-97fb-15363803de41", - "created": "2022-06-29T15:07:39.617032Z", - "modified": "2022-06-29T15:07:39.617032Z", + "id": "attack-pattern--4e5ff619-85fd-4d36-a3c4-9a400c8cbfe5", + "created_by_ref": "identity--53e04b17-377e-45d2-b176-3294849546cc", + "created": "2022-07-01T03:29:17.101267Z", + "modified": "2022-07-01T03:29:17.101267Z", "name": "Create fake experts", - "description": "TA03", + "description": "TA16", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-people" + "phase_name": "establish-legitimacy" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--b5a12b0e-1562-4288-b8ae-43eb18200bf1" + "marking-definition--b0ce9dfe-3859-4529-b404-babf37771f31" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6bb89169-af6e-41d7-8ee6-5e6ca0778b23.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--501730c4-a597-4dfe-8487-688befb42b10.json similarity index 57% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--6bb89169-af6e-41d7-8ee6-5e6ca0778b23.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--501730c4-a597-4dfe-8487-688befb42b10.json index 24f1252..200519c 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6bb89169-af6e-41d7-8ee6-5e6ca0778b23.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--501730c4-a597-4dfe-8487-688befb42b10.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--cebe018f-a940-4950-83e0-055e2bafc1ea", + "id": "bundle--a8a6204b-44a1-4b59-a890-e5cc4adeecee", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--6bb89169-af6e-41d7-8ee6-5e6ca0778b23", - "created_by_ref": "identity--b7adce0d-6fd8-4d25-8254-f34ce9721b28", - "created": "2022-06-29T15:07:39.659606Z", - "modified": "2022-06-29T15:07:39.659606Z", - "name": "Use hashtag", + "id": "attack-pattern--501730c4-a597-4dfe-8487-688befb42b10", + "created_by_ref": "identity--e785f97d-e66a-4e3b-9d3d-dcb75ab307d8", + "created": "2022-07-01T03:29:17.134957Z", + "modified": "2022-07-01T03:29:17.134957Z", + "name": "Deliver Ads", "description": "TA09", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "exposure" + "phase_name": "deliver-content" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0055.md", - "external_id": "T0055" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0114.md", + "external_id": "T0114" } ], "object_marking_refs": [ - "marking-definition--a16dbe3d-b808-4942-a563-13e088a7dc1a" + "marking-definition--6206fbd9-5b7d-4101-9869-4a031afbe4df" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0d1dcc47-dbd5-4b4d-bedf-e6b5321086a9.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--55e306db-023f-4634-8e7a-d9f1753f1403.json similarity index 56% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--0d1dcc47-dbd5-4b4d-bedf-e6b5321086a9.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--55e306db-023f-4634-8e7a-d9f1753f1403.json index d4af3ed..a8109d4 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0d1dcc47-dbd5-4b4d-bedf-e6b5321086a9.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--55e306db-023f-4634-8e7a-d9f1753f1403.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--e759c8f6-0b29-432e-9faf-10f90806ef32", + "id": "bundle--6565e982-ab5f-4f1c-b5d0-ea61039f3851", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--0d1dcc47-dbd5-4b4d-bedf-e6b5321086a9", - "created_by_ref": "identity--edc70461-aee4-45d2-af9b-a7bfd245f83a", - "created": "2022-06-29T15:07:39.656664Z", - "modified": "2022-06-29T15:07:39.656664Z", - "name": "Tertiary sites amplify news", + "id": "attack-pattern--55e306db-023f-4634-8e7a-d9f1753f1403", + "created_by_ref": "identity--4e65dc6d-3f43-4ea2-a633-6ea513b65471", + "created": "2022-07-01T03:29:17.1359Z", + "modified": "2022-07-01T03:29:17.1359Z", + "name": "Comment or Reply on Content", "description": "TA09", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "exposure" + "phase_name": "deliver-content" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0052.md", - "external_id": "T0052" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0116.md", + "external_id": "T0116" } ], "object_marking_refs": [ - "marking-definition--29dfd462-e316-4667-b832-6fd1045344e2" + "marking-definition--1d1032b7-2302-4980-b4fa-0ddaca3c1fe8" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5661a6e3-4eef-4983-bf67-ade655c61b41.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--571a7838-129d-4251-b809-3309b9e8aa5f.json similarity index 56% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--5661a6e3-4eef-4983-bf67-ade655c61b41.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--571a7838-129d-4251-b809-3309b9e8aa5f.json index 2cac4ae..1aae313 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5661a6e3-4eef-4983-bf67-ade655c61b41.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--571a7838-129d-4251-b809-3309b9e8aa5f.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--aa02d4e5-8a1f-44af-9708-c4f71dee2b3c", + "id": "bundle--32416bb2-ce1b-4f31-87d1-f3f0774c4db0", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--5661a6e3-4eef-4983-bf67-ade655c61b41", - "created_by_ref": "identity--1edf1f3b-897f-4983-b2e9-ada3f05908bf", - "created": "2022-06-29T15:07:39.672282Z", - "modified": "2022-06-29T15:07:39.672282Z", - "name": "Analyze existing communities", + "id": "attack-pattern--571a7838-129d-4251-b809-3309b9e8aa5f", + "created_by_ref": "identity--406cf1bb-fe17-4550-b474-c0199f3e6e7c", + "created": "2022-07-01T03:29:17.11871Z", + "modified": "2022-07-01T03:29:17.11871Z", + "name": "Divide", "description": "TA02", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "objective-planning" + "phase_name": "plan-objectives" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0070.md", - "external_id": "T0070" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0079.md", + "external_id": "T0079" } ], "object_marking_refs": [ - "marking-definition--2f71a7e8-5ad1-4d6e-9ec5-4e1b5b764f2e" + "marking-definition--f0f06852-d69f-4922-a268-3cca81dfe969" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--58c939d8-05bb-45ca-b12d-dcd9cc8df2dc.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--58c939d8-05bb-45ca-b12d-dcd9cc8df2dc.json new file mode 100644 index 0000000..a6cd038 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--58c939d8-05bb-45ca-b12d-dcd9cc8df2dc.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--32db5c5c-988d-4503-aeff-538c828bcdb1", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--58c939d8-05bb-45ca-b12d-dcd9cc8df2dc", + "created_by_ref": "identity--e46499c8-aed1-4aeb-80ff-a73482840b99", + "created": "2022-07-01T03:29:17.121892Z", + "modified": "2022-07-01T03:29:17.121892Z", + "name": "Develop Image-based Content", + "description": "TA06", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "develop-content" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0086.md", + "external_id": "T0086" + } + ], + "object_marking_refs": [ + "marking-definition--8f90dd1e-493a-45f6-afd6-160a43d5980f" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--84a2d44a-8820-41ed-ac79-c5aa7a8f8309.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5a63d85c-fe2a-4932-8db2-f5efaabdfff5.json similarity index 55% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--84a2d44a-8820-41ed-ac79-c5aa7a8f8309.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--5a63d85c-fe2a-4932-8db2-f5efaabdfff5.json index 5142996..b4fd042 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--84a2d44a-8820-41ed-ac79-c5aa7a8f8309.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5a63d85c-fe2a-4932-8db2-f5efaabdfff5.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--259a9ba2-5bf6-4cd5-a0ee-f648593ab0b6", + "id": "bundle--ea9457a6-d74d-4dc9-9d31-9e6f3ac6c249", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--84a2d44a-8820-41ed-ac79-c5aa7a8f8309", - "created_by_ref": "identity--36185e59-28d9-4668-bc6f-e1ee4a79cf41", - "created": "2022-06-29T15:07:39.610695Z", - "modified": "2022-06-29T15:07:39.610695Z", - "name": "5Ds (dismiss, distort, distract, dismay, divide)", + "id": "attack-pattern--5a63d85c-fe2a-4932-8db2-f5efaabdfff5", + "created_by_ref": "identity--b6bd7a37-8032-46e7-bda4-0605831594c3", + "created": "2022-07-01T03:29:17.115975Z", + "modified": "2022-07-01T03:29:17.115975Z", + "name": "Determine Target Audiences", "description": "TA01", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "strategic-planning" + "phase_name": "plan-strategy" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0001.md", - "external_id": "T0001" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0073.md", + "external_id": "T0073" } ], "object_marking_refs": [ - "marking-definition--1733e05c-8340-4ffe-a371-0816092f6ace" + "marking-definition--7c733617-4276-4f98-94a3-c8b7ad2e371e" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5b44f922-66c0-4241-b933-4781edcbd457.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5b44f922-66c0-4241-b933-4781edcbd457.json new file mode 100644 index 0000000..5837aa5 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5b44f922-66c0-4241-b933-4781edcbd457.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--239d5fad-9f60-4641-830f-930ff264243a", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--5b44f922-66c0-4241-b933-4781edcbd457", + "created_by_ref": "identity--24d24d03-1356-4aee-a3da-4653eb081889", + "created": "2022-07-01T03:29:17.134421Z", + "modified": "2022-07-01T03:29:17.134421Z", + "name": "Employ Commercial Analytic Firms", + "description": "TA08", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "conduct-pump-priming" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0113.md", + "external_id": "T0113" + } + ], + "object_marking_refs": [ + "marking-definition--7cd3c8f4-122d-4262-9f63-a6e646f96fb5" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--413bb66c-1ecf-4e9d-bb68-3ea2161d449b.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5cc3ca96-5655-4238-8d76-9e212bbae9ec.json similarity index 63% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--413bb66c-1ecf-4e9d-bb68-3ea2161d449b.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--5cc3ca96-5655-4238-8d76-9e212bbae9ec.json index ef6be3c..934c2e4 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--413bb66c-1ecf-4e9d-bb68-3ea2161d449b.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5cc3ca96-5655-4238-8d76-9e212bbae9ec.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--48ab6beb-9888-44d2-9ca5-4d09b8f589a6", + "id": "bundle--09d81786-129a-4f25-88d1-113a30f100a9", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--413bb66c-1ecf-4e9d-bb68-3ea2161d449b", - "created_by_ref": "identity--6d959eae-cd5a-4520-9323-608b5f4794c8", - "created": "2022-06-29T15:07:39.635202Z", - "modified": "2022-06-29T15:07:39.635202Z", - "name": "Manipulate online polls", + "id": "attack-pattern--5cc3ca96-5655-4238-8d76-9e212bbae9ec", + "created_by_ref": "identity--58d52260-ef12-4246-ad63-ad69b0360e98", + "created": "2022-07-01T03:29:17.107233Z", + "modified": "2022-07-01T03:29:17.107233Z", + "name": "Online polls", "description": "TA07", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" + "phase_name": "select-channels-and-affordances" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--946301e5-d900-4e74-89ec-2686d4b7718d" + "marking-definition--3da6cf9d-1ce4-4f2e-b6d4-1923b709345d" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7b3dd190-7a38-4944-aeb0-e1d7592c8c3b.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5ced2330-8d58-4417-8ae3-ce66cabb513c.json similarity index 67% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--7b3dd190-7a38-4944-aeb0-e1d7592c8c3b.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--5ced2330-8d58-4417-8ae3-ce66cabb513c.json index 73c8771..59f4e99 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7b3dd190-7a38-4944-aeb0-e1d7592c8c3b.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5ced2330-8d58-4417-8ae3-ce66cabb513c.json @@ -1,15 +1,15 @@ { "type": "bundle", - "id": "bundle--8f654654-1eb3-43ff-b762-94334f0c4e61", + "id": "bundle--9dc44dbc-1527-4635-bafe-eb6f3a723d8e", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--7b3dd190-7a38-4944-aeb0-e1d7592c8c3b", - "created_by_ref": "identity--6a5453fb-9ad6-45d7-ada3-7d8e65ea41ad", - "created": "2022-06-29T15:07:39.66129Z", - "modified": "2022-06-29T15:07:39.66129Z", - "name": "Organise remote rallies and events", + "id": "attack-pattern--5ced2330-8d58-4417-8ae3-ce66cabb513c", + "created_by_ref": "identity--6edd4070-0d58-4fcb-a92c-1cd606b1e372", + "created": "2022-07-01T03:29:17.112292Z", + "modified": "2022-07-01T03:29:17.112292Z", + "name": "Organize Events", "description": "TA10", "kill_chain_phases": [ { @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--6ff67578-a4a0-4353-844b-2d86bb87e4a0" + "marking-definition--b4a225e6-c764-4dc7-907a-91c3b332d65d" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5db1d9a2-52a4-4b43-bca4-cdb387335a3b.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5db1d9a2-52a4-4b43-bca4-cdb387335a3b.json new file mode 100644 index 0000000..9e99413 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5db1d9a2-52a4-4b43-bca4-cdb387335a3b.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--87fd5ec9-96cc-4e3f-bde8-108a1e854663", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--5db1d9a2-52a4-4b43-bca4-cdb387335a3b", + "created_by_ref": "identity--5f39833d-3706-4af3-b5db-9f00bdc5e02c", + "created": "2022-07-01T03:29:17.126517Z", + "modified": "2022-07-01T03:29:17.126517Z", + "name": "Leverage Content Farm", + "description": "TA15", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-social-assets" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0096.md", + "external_id": "T0096" + } + ], + "object_marking_refs": [ + "marking-definition--f7ea534a-bb6f-4ea3-a4f2-24a05bcc6a32" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5f3b98bc-bb23-495b-bb5f-d374cb552333.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5f3b98bc-bb23-495b-bb5f-d374cb552333.json new file mode 100644 index 0000000..0a11f3f --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--5f3b98bc-bb23-495b-bb5f-d374cb552333.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--f27d59e6-76f4-4ac5-b5cf-41b927ef711f", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--5f3b98bc-bb23-495b-bb5f-d374cb552333", + "created_by_ref": "identity--04a2369c-c174-45ec-8f6c-bd86d4615e94", + "created": "2022-07-01T03:29:17.140525Z", + "modified": "2022-07-01T03:29:17.140525Z", + "name": "Encourage Attendance at Events", + "description": "TA10", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "drive-offline-activity" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0126.md", + "external_id": "T0126" + } + ], + "object_marking_refs": [ + "marking-definition--75b6f15e-0ebc-4023-8401-c77c43cad473" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--61f9d9e8-83c8-4eaa-b7c2-b7bba16b948b.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--61f9d9e8-83c8-4eaa-b7c2-b7bba16b948b.json new file mode 100644 index 0000000..4cb5688 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--61f9d9e8-83c8-4eaa-b7c2-b7bba16b948b.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--d7573ae6-e8b1-4cfd-95da-0d9cd0a31857", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--61f9d9e8-83c8-4eaa-b7c2-b7bba16b948b", + "created_by_ref": "identity--bddd29bc-196d-40b4-8c68-be85f2f68e35", + "created": "2022-07-01T03:29:17.14189Z", + "modified": "2022-07-01T03:29:17.14189Z", + "name": "Conceal Operational Activity", + "description": "TA11", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "persist-in-the-information-environment" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0129.md", + "external_id": "T0129" + } + ], + "object_marking_refs": [ + "marking-definition--4bfa250f-3859-47a6-b2aa-0a0feab550b8" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bc283648-febe-4abc-b09f-9f57e4778c2e.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6427ef0d-29ee-4b97-a3c6-db7595938187.json similarity index 63% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--bc283648-febe-4abc-b09f-9f57e4778c2e.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--6427ef0d-29ee-4b97-a3c6-db7595938187.json index 2aa3eca..09a0237 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bc283648-febe-4abc-b09f-9f57e4778c2e.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--6427ef0d-29ee-4b97-a3c6-db7595938187.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--3a8911d2-c36c-4ba6-932b-9f29761da697", + "id": "bundle--d744176d-9d54-4bd5-abdf-10ad132f46ad", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--bc283648-febe-4abc-b09f-9f57e4778c2e", - "created_by_ref": "identity--2b8570fe-aece-4178-9c33-138d0019412e", - "created": "2022-06-29T15:07:39.651502Z", - "modified": "2022-06-29T15:07:39.651502Z", - "name": "Search Engine Optimization", + "id": "attack-pattern--6427ef0d-29ee-4b97-a3c6-db7595938187", + "created_by_ref": "identity--52aa5c8b-baa0-4b4b-81dc-3b0337180f85", + "created": "2022-07-01T03:29:17.11044Z", + "modified": "2022-07-01T03:29:17.11044Z", + "name": "Use Search Engine Optimization", "description": "TA08", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "pump-priming" + "phase_name": "conduct-pump-priming" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--b4c34737-3f47-4665-ab2d-1e7fde67bfae" + "marking-definition--e1cbfcdc-3d0b-4a0f-8924-0b60f6e7db54" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9c80a414-47c7-4871-8874-8f8ea4584f3d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--66064bf0-d00b-490e-b6f2-3e07baf1a830.json similarity index 70% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--9c80a414-47c7-4871-8874-8f8ea4584f3d.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--66064bf0-d00b-490e-b6f2-3e07baf1a830.json index 5ac8167..2d9cc5b 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9c80a414-47c7-4871-8874-8f8ea4584f3d.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--66064bf0-d00b-490e-b6f2-3e07baf1a830.json @@ -1,14 +1,14 @@ { "type": "bundle", - "id": "bundle--21fc3756-a88c-4614-a6a2-d7115c3bfefd", + "id": "bundle--b8e6d9b6-fb02-4100-a18f-e587dd3dc083", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--9c80a414-47c7-4871-8874-8f8ea4584f3d", - "created_by_ref": "identity--5e9bd661-f645-4170-b4c3-f554f1fe5856", - "created": "2022-06-29T15:07:39.630148Z", - "modified": "2022-06-29T15:07:39.630148Z", + "id": "attack-pattern--66064bf0-d00b-490e-b6f2-3e07baf1a830", + "created_by_ref": "identity--b33bfbf5-ecf8-4423-bbb2-4b53d30975e9", + "created": "2022-07-01T03:29:17.106773Z", + "modified": "2022-07-01T03:29:17.106773Z", "name": "Distort facts", "description": "TA06", "kill_chain_phases": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--d9a09fda-4b37-4fcd-91ab-b684c3fa55cd" + "marking-definition--e34375e0-40a4-44ad-8528-8ad89576aa4f" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--15befb69-cd3a-436d-aacb-65d4a31233d9.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--670a229b-d2b3-40ae-8684-32ed5253fa30.json similarity index 63% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--15befb69-cd3a-436d-aacb-65d4a31233d9.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--670a229b-d2b3-40ae-8684-32ed5253fa30.json index 4e5e0e9..fd6e451 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--15befb69-cd3a-436d-aacb-65d4a31233d9.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--670a229b-d2b3-40ae-8684-32ed5253fa30.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--14f32046-10d7-449e-ba38-9bfcd6073023", + "id": "bundle--5dea1bc9-cc76-4fe4-8423-c6950ec15275", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--15befb69-cd3a-436d-aacb-65d4a31233d9", - "created_by_ref": "identity--afc71eb6-14b5-44fd-a7a1-35f88f2fbb79", - "created": "2022-06-29T15:07:39.647547Z", - "modified": "2022-06-29T15:07:39.647547Z", - "name": "Kernel of Truth", + "id": "attack-pattern--670a229b-d2b3-40ae-8684-32ed5253fa30", + "created_by_ref": "identity--7fc9ce06-d085-4bbc-98eb-7c160b29c799", + "created": "2022-07-01T03:29:17.108618Z", + "modified": "2022-07-01T03:29:17.108618Z", + "name": "Seed Kernel of truth", "description": "TA08", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "pump-priming" + "phase_name": "conduct-pump-priming" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--fc4be82a-c933-4783-9df4-b5b0c7d80a91" + "marking-definition--f0fdf08b-0e76-4424-abc5-18a83861904d" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--aac86bd2-8f32-4177-9bfe-26ab811b3a58.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--68bcc375-48d3-4efe-aa6b-dc94b2c9be3b.json similarity index 60% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--aac86bd2-8f32-4177-9bfe-26ab811b3a58.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--68bcc375-48d3-4efe-aa6b-dc94b2c9be3b.json index 26ffb5c..898f190 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--aac86bd2-8f32-4177-9bfe-26ab811b3a58.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--68bcc375-48d3-4efe-aa6b-dc94b2c9be3b.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--299d914b-b5a1-4fa0-8e75-ad7af7cbc2ab", + "id": "bundle--2a1f0e75-42de-4b99-8a11-d450f3130fde", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--aac86bd2-8f32-4177-9bfe-26ab811b3a58", - "created_by_ref": "identity--cde3ccc9-4f7e-4dde-9c25-912f897161ca", - "created": "2022-06-29T15:07:39.65403Z", - "modified": "2022-06-29T15:07:39.65403Z", - "name": "Flooding", - "description": "TA09", + "id": "attack-pattern--68bcc375-48d3-4efe-aa6b-dc94b2c9be3b", + "created_by_ref": "identity--c12463fb-d446-4d46-86d8-187a9ccd523e", + "created": "2022-07-01T03:29:17.111805Z", + "modified": "2022-07-01T03:29:17.111805Z", + "name": "Flooding the Information Space", + "description": "TA17", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "exposure" + "phase_name": "maximize-exposure" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--0f2d59a5-d16b-41d9-b7b9-5e89aedb76c6" + "marking-definition--ce5228d1-307d-4b48-99bd-dc5f8baf0157" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--08061315-22ae-4838-8413-6909586a0356.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--69e703e0-990f-45cf-a4eb-9eb2193ee58d.json similarity index 53% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--08061315-22ae-4838-8413-6909586a0356.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--69e703e0-990f-45cf-a4eb-9eb2193ee58d.json index 206ccdd..c7bb0d3 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--08061315-22ae-4838-8413-6909586a0356.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--69e703e0-990f-45cf-a4eb-9eb2193ee58d.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--25b94213-21b5-49b7-b27a-cce68d870884", + "id": "bundle--28145764-7023-4644-a530-6de507b1335e", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--08061315-22ae-4838-8413-6909586a0356", - "created_by_ref": "identity--2580ddb8-9b92-4654-97dd-19ded33583ee", - "created": "2022-06-29T15:07:39.660319Z", - "modified": "2022-06-29T15:07:39.660319Z", - "name": "Dedicated channels disseminate information pollution", - "description": "TA09", + "id": "attack-pattern--69e703e0-990f-45cf-a4eb-9eb2193ee58d", + "created_by_ref": "identity--81d31ff3-891e-4a34-b094-297d877e070a", + "created": "2022-07-01T03:29:17.12789Z", + "modified": "2022-07-01T03:29:17.12789Z", + "name": "Prepare Assets Impersonating Legitimate Entities", + "description": "TA16", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "exposure" + "phase_name": "establish-legitimacy" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0056.md", - "external_id": "T0056" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0099.md", + "external_id": "T0099" } ], "object_marking_refs": [ - "marking-definition--630ff03e-fbcf-4d93-baf7-d06661fb65db" + "marking-definition--7238cf38-fabd-46b9-a27d-325688c423fe" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7283861d-801a-40d3-8e63-fb2d9951fee6.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7283861d-801a-40d3-8e63-fb2d9951fee6.json new file mode 100644 index 0000000..198af92 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7283861d-801a-40d3-8e63-fb2d9951fee6.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--398e0fec-416d-4d9b-bc96-72d2ecc5cb84", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--7283861d-801a-40d3-8e63-fb2d9951fee6", + "created_by_ref": "identity--6d431156-2568-4a98-a905-75b4dc2ec0b8", + "created": "2022-07-01T03:29:17.12891Z", + "modified": "2022-07-01T03:29:17.12891Z", + "name": "Create Localized Content", + "description": "TA05", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "microtarget" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0101.md", + "external_id": "T0101" + } + ], + "object_marking_refs": [ + "marking-definition--4e4ef88f-e70b-4a42-99b7-9d6114c92124" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--789aae94-1312-4aab-b415-3320bf01b20c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--77789dad-9435-4866-a083-4dbc0a456727.json similarity index 64% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--789aae94-1312-4aab-b415-3320bf01b20c.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--77789dad-9435-4866-a083-4dbc0a456727.json index 4cac770..c89a3d0 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--789aae94-1312-4aab-b415-3320bf01b20c.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--77789dad-9435-4866-a083-4dbc0a456727.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--1bcba2d0-8891-4012-a2a0-04396c1cfa75", + "id": "bundle--98670912-a093-4062-ba4e-ca29ac8099ae", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--789aae94-1312-4aab-b415-3320bf01b20c", - "created_by_ref": "identity--3f37ec47-1cf2-46c9-bc9a-335f456ebd73", - "created": "2022-06-29T15:07:39.62325Z", - "modified": "2022-06-29T15:07:39.62325Z", - "name": "Clickbait", + "id": "attack-pattern--77789dad-9435-4866-a083-4dbc0a456727", + "created_by_ref": "identity--6dbc3bb6-bfb1-4814-a642-e84b19de7b32", + "created": "2022-07-01T03:29:17.104029Z", + "modified": "2022-07-01T03:29:17.104029Z", + "name": "Create Clickbait", "description": "TA05", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "microtargeting" + "phase_name": "microtarget" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--75a460d4-730b-480f-8945-2a756876c5a5" + "marking-definition--9df75d1a-d0a1-4531-b34d-f16b54d677be" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b00e5ddc-d058-4c95-bbeb-e319c45c4209.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7ae144a2-3b79-4740-b651-2d24c2c1a4b1.json similarity index 66% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--b00e5ddc-d058-4c95-bbeb-e319c45c4209.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--7ae144a2-3b79-4740-b651-2d24c2c1a4b1.json index 6baaf33..e7f6cc4 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b00e5ddc-d058-4c95-bbeb-e319c45c4209.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7ae144a2-3b79-4740-b651-2d24c2c1a4b1.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--cf1d410f-3806-41d6-b664-3378d26a4ea8", + "id": "bundle--71618137-5f46-4476-832c-f02e7ab38e63", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--b00e5ddc-d058-4c95-bbeb-e319c45c4209", - "created_by_ref": "identity--233e6a79-d4b8-47ff-8069-a7b3ba016fe5", - "created": "2022-06-29T15:07:39.650266Z", - "modified": "2022-06-29T15:07:39.650266Z", + "id": "attack-pattern--7ae144a2-3b79-4740-b651-2d24c2c1a4b1", + "created_by_ref": "identity--649e1891-37f6-459c-87d9-bc02129f0023", + "created": "2022-07-01T03:29:17.109986Z", + "modified": "2022-07-01T03:29:17.109986Z", "name": "Use fake experts", "description": "TA08", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "pump-priming" + "phase_name": "conduct-pump-priming" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--03fa1f90-ecd1-4c5f-8250-f0342df68267" + "marking-definition--a086a228-95e2-4a73-8f45-73bc6df77063" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ecefdcdc-b3f2-4ab4-a68f-e0d3eb1f1e93.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7cb970a6-d4bb-43be-ac7f-92a1b3eb24ef.json similarity index 55% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--ecefdcdc-b3f2-4ab4-a68f-e0d3eb1f1e93.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--7cb970a6-d4bb-43be-ac7f-92a1b3eb24ef.json index a60db31..5c4ee96 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ecefdcdc-b3f2-4ab4-a68f-e0d3eb1f1e93.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7cb970a6-d4bb-43be-ac7f-92a1b3eb24ef.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--7c5cb204-0e8e-403e-bc5d-60e6cadc61f9", + "id": "bundle--09ed4966-e6e3-4248-be6c-fb2d407147c6", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--ecefdcdc-b3f2-4ab4-a68f-e0d3eb1f1e93", - "created_by_ref": "identity--1c32f480-43ff-465e-ae3f-27a5c26492fd", - "created": "2022-06-29T15:07:39.667406Z", - "modified": "2022-06-29T15:07:39.667406Z", - "name": "Social media engagement", + "id": "attack-pattern--7cb970a6-d4bb-43be-ac7f-92a1b3eb24ef", + "created_by_ref": "identity--34d1bc62-7da2-4c56-b1c5-320c7cd9f44f", + "created": "2022-07-01T03:29:17.144152Z", + "modified": "2022-07-01T03:29:17.144152Z", + "name": "Measure Effectiveness Indicators (or KPIs)", "description": "TA12", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "measure-effectiveness" + "phase_name": "assess-effectiveness" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0064.md", - "external_id": "T0064" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0134.md", + "external_id": "T0134" } ], "object_marking_refs": [ - "marking-definition--56fb8dbc-d520-4738-a907-b2c8268fe0e3" + "marking-definition--4f5f5cd0-90a6-4338-beaf-441168ca9303" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e9884739-ea1d-4c73-bf20-4c98709a6f28.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--82022c93-6e94-4842-99b6-93a783657a12.json similarity index 60% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--e9884739-ea1d-4c73-bf20-4c98709a6f28.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--82022c93-6e94-4842-99b6-93a783657a12.json index 63e75aa..c4c6856 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e9884739-ea1d-4c73-bf20-4c98709a6f28.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--82022c93-6e94-4842-99b6-93a783657a12.json @@ -1,15 +1,15 @@ { "type": "bundle", - "id": "bundle--18a4ca3c-ba1c-4365-a814-1d7353e534cd", + "id": "bundle--73b63361-4b2c-4838-b8ed-6ebf713c2cad", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--e9884739-ea1d-4c73-bf20-4c98709a6f28", - "created_by_ref": "identity--9e3b644d-4304-4922-820b-1b132631811a", - "created": "2022-06-29T15:07:39.629147Z", - "modified": "2022-06-29T15:07:39.629147Z", - "name": "Conspiracy narratives", + "id": "attack-pattern--82022c93-6e94-4842-99b6-93a783657a12", + "created_by_ref": "identity--6f3df079-f7df-473f-8e69-65e4867052e6", + "created": "2022-07-01T03:29:17.123282Z", + "modified": "2022-07-01T03:29:17.123282Z", + "name": "Obtain Private Documents", "description": "TA06", "kill_chain_phases": [ { @@ -20,12 +20,12 @@ "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0022.md", - "external_id": "T0022" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0089.md", + "external_id": "T0089" } ], "object_marking_refs": [ - "marking-definition--f5b9bb2a-3b58-4078-b122-3d8c5e124e0d" + "marking-definition--73f8f675-6ecb-4d1b-bc52-8b52558d8493" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce6626db-4c1a-4b99-bc4c-bc2d5898c186.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--82df414a-473f-4d78-9bb0-ee9efd58965c.json similarity index 59% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce6626db-4c1a-4b99-bc4c-bc2d5898c186.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--82df414a-473f-4d78-9bb0-ee9efd58965c.json index 533139b..fb9c4f2 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce6626db-4c1a-4b99-bc4c-bc2d5898c186.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--82df414a-473f-4d78-9bb0-ee9efd58965c.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--48574594-5a0c-43ad-843b-6dbca87c3369", + "id": "bundle--9d230f01-082e-474e-a3cf-f0ae817b0caf", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--ce6626db-4c1a-4b99-bc4c-bc2d5898c186", - "created_by_ref": "identity--41a22faf-481a-479c-ab75-a891814eb827", - "created": "2022-06-29T15:07:39.670552Z", - "modified": "2022-06-29T15:07:39.670552Z", - "name": "Respond to breaking news event", - "description": "TA02", + "id": "attack-pattern--82df414a-473f-4d78-9bb0-ee9efd58965c", + "created_by_ref": "identity--9be00094-7bf8-4112-8695-c3f7debcfc07", + "created": "2022-07-01T03:29:17.115059Z", + "modified": "2022-07-01T03:29:17.115059Z", + "name": "Respond to Breaking News Event or Active Crisis", + "description": "TA14", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "objective-planning" + "phase_name": "develop-narratives" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--0f810227-bdc9-41fe-9306-5d7458763f2d" + "marking-definition--879a346f-3cc6-4e3a-accd-2d0ae5b6f2f2" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f2292557-c4d2-49c8-bac5-2bdb9ff43165.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8311c92c-61a1-4277-afca-5c4a43e18c06.json similarity index 63% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--f2292557-c4d2-49c8-bac5-2bdb9ff43165.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--8311c92c-61a1-4277-afca-5c4a43e18c06.json index d4a5b7b..1b3fbe1 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f2292557-c4d2-49c8-bac5-2bdb9ff43165.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8311c92c-61a1-4277-afca-5c4a43e18c06.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--b50ab232-8aa1-4ec8-9564-0cdfc9466fc6", + "id": "bundle--d5c37e0a-0fd6-43c3-8ecd-a4f02bc6836e", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--f2292557-c4d2-49c8-bac5-2bdb9ff43165", - "created_by_ref": "identity--3d83a869-9099-4861-af28-bcfcd5bd09a1", - "created": "2022-06-29T15:07:39.668922Z", - "modified": "2022-06-29T15:07:39.668922Z", - "name": "Degrade adversary", + "id": "attack-pattern--8311c92c-61a1-4277-afca-5c4a43e18c06", + "created_by_ref": "identity--cfb5f6df-5c4d-4a9a-823e-337fa893c6b7", + "created": "2022-07-01T03:29:17.114594Z", + "modified": "2022-07-01T03:29:17.114594Z", + "name": "Degrade Adversary", "description": "TA02", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "objective-planning" + "phase_name": "plan-objectives" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--7f0968ff-b34a-4453-a8eb-cdabb7a5f0e2" + "marking-definition--b04ba37c-7f96-4ce1-b762-dee94ae0bd38" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b7d38923-ba1b-4510-b82e-be675c8ea67f.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--83124e9f-4981-445c-aa20-b7a3990c18ab.json similarity index 64% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--b7d38923-ba1b-4510-b82e-be675c8ea67f.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--83124e9f-4981-445c-aa20-b7a3990c18ab.json index 783d2ee..ff7c943 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b7d38923-ba1b-4510-b82e-be675c8ea67f.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--83124e9f-4981-445c-aa20-b7a3990c18ab.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--c960c2d9-0bd8-43e4-9ff6-9636a054cf70", + "id": "bundle--fde132d9-b1ed-4e00-a4da-b566d38a2a8d", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--b7d38923-ba1b-4510-b82e-be675c8ea67f", - "created_by_ref": "identity--d2aea7f2-2399-42fa-966c-7965cccd334f", - "created": "2022-06-29T15:07:39.611653Z", - "modified": "2022-06-29T15:07:39.611653Z", + "id": "attack-pattern--83124e9f-4981-445c-aa20-b7a3990c18ab", + "created_by_ref": "identity--e5631f8e-4441-44b0-98de-44cef0359a06", + "created": "2022-07-01T03:29:17.099228Z", + "modified": "2022-07-01T03:29:17.099228Z", "name": "Facilitate State Propaganda", - "description": "TA01", + "description": "TA02", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "strategic-planning" + "phase_name": "plan-objectives" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--8e92cb65-7303-4b12-9378-48449e853d08" + "marking-definition--27285727-7410-4083-a6b1-94d53ac3486a" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--841e1310-50ac-44c6-b5b8-53e1a66b6347.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--841e1310-50ac-44c6-b5b8-53e1a66b6347.json deleted file mode 100644 index 4d3bd2f..0000000 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--841e1310-50ac-44c6-b5b8-53e1a66b6347.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--22c76f7d-51d1-4cf0-b9d7-b8be8b4e7eea", - "objects": [ - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--841e1310-50ac-44c6-b5b8-53e1a66b6347", - "created_by_ref": "identity--7dce5432-6435-4489-ad71-88841216f4f4", - "created": "2022-06-29T15:07:39.619506Z", - "modified": "2022-06-29T15:07:39.619506Z", - "name": "Use concealment", - "description": "TA04", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "develop-networks" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0012.md", - "external_id": "T0012" - } - ], - "object_marking_refs": [ - "marking-definition--f124dc4e-34a1-4178-8675-6fb7dba683ce" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - } - ] -} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--86b561d4-5a64-4dbb-bc52-2c68bdec854a.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--86b561d4-5a64-4dbb-bc52-2c68bdec854a.json new file mode 100644 index 0000000..78b1ebd --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--86b561d4-5a64-4dbb-bc52-2c68bdec854a.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--45df3373-50a8-406a-a4ba-67351400250e", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--86b561d4-5a64-4dbb-bc52-2c68bdec854a", + "created_by_ref": "identity--be1c3972-948e-444a-8bce-61c3b8643de9", + "created": "2022-07-01T03:29:17.125148Z", + "modified": "2022-07-01T03:29:17.125148Z", + "name": "Acquire/ recruit Network", + "description": "TA15", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-social-assets" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0093.md", + "external_id": "T0093" + } + ], + "object_marking_refs": [ + "marking-definition--6ff5c683-050b-4fa1-a54f-49cb8d1d3df2" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--cd48ce8e-e0e4-4c95-ab9d-13389b50b039.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--86e913cc-f722-4f2e-a2df-150ade9d0726.json similarity index 60% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--cd48ce8e-e0e4-4c95-ab9d-13389b50b039.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--86e913cc-f722-4f2e-a2df-150ade9d0726.json index ec663b8..edb31a1 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--cd48ce8e-e0e4-4c95-ab9d-13389b50b039.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--86e913cc-f722-4f2e-a2df-150ade9d0726.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--1d8fdc65-c9a5-47a0-b9c8-0e1410ed1c39", + "id": "bundle--6c77341c-66ea-442b-9fcc-4e3c9b831ab4", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--cd48ce8e-e0e4-4c95-ab9d-13389b50b039", - "created_by_ref": "identity--223a5089-a1c2-4ad6-9043-a8f21293c430", - "created": "2022-06-29T15:07:39.624076Z", - "modified": "2022-06-29T15:07:39.624076Z", - "name": "Conduct Fundraising Campaigns", - "description": "TA05", + "id": "attack-pattern--86e913cc-f722-4f2e-a2df-150ade9d0726", + "created_by_ref": "identity--778425bc-e2fc-4e82-9f10-74e98082be43", + "created": "2022-07-01T03:29:17.104489Z", + "modified": "2022-07-01T03:29:17.104489Z", + "name": "Conduct fundraising", + "description": "TA10", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "microtargeting" + "phase_name": "drive-offline-activity" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--bbc7ec0c-6dfc-4981-b955-6bbfa5d84dae" + "marking-definition--6e5bb1e1-f5ac-42b6-b078-fe3292fa9eb1" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8702511a-d1e3-4ca5-97a3-0a8b33bbdf53.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8702511a-d1e3-4ca5-97a3-0a8b33bbdf53.json new file mode 100644 index 0000000..b62f72e --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8702511a-d1e3-4ca5-97a3-0a8b33bbdf53.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--c2c389bf-763d-41d8-a917-97c15d090cd2", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--8702511a-d1e3-4ca5-97a3-0a8b33bbdf53", + "created_by_ref": "identity--a26fa083-3fc8-4278-8ed5-77a44b571648", + "created": "2022-07-01T03:29:17.123743Z", + "modified": "2022-07-01T03:29:17.123743Z", + "name": "Create Inauthentic Accounts", + "description": "TA15", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-social-assets" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0090.md", + "external_id": "T0090" + } + ], + "object_marking_refs": [ + "marking-definition--c15c1264-bd1f-40d1-b0a2-bb3f67de3659" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--89c58eaa-2973-4ce4-81b2-bc644d8dff02.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--89c58eaa-2973-4ce4-81b2-bc644d8dff02.json new file mode 100644 index 0000000..9a4634f --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--89c58eaa-2973-4ce4-81b2-bc644d8dff02.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--5473b54a-05dc-4b79-ab31-9e2d5247347e", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--89c58eaa-2973-4ce4-81b2-bc644d8dff02", + "created_by_ref": "identity--771e28f4-3218-4abb-b6bb-a27c787bdbfa", + "created": "2022-07-01T03:29:17.133055Z", + "modified": "2022-07-01T03:29:17.133055Z", + "name": "Formal Diplomatic Channels", + "description": "TA07", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "select-channels-and-affordances" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0110.md", + "external_id": "T0110" + } + ], + "object_marking_refs": [ + "marking-definition--871acae2-78f0-4ead-8a9e-b10689e07906" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9c13610c-f066-478e-b8e8-013133e12b90.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8ca19a73-b5e2-4715-bb61-7f27777e14b1.json similarity index 64% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--9c13610c-f066-478e-b8e8-013133e12b90.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--8ca19a73-b5e2-4715-bb61-7f27777e14b1.json index a1983e6..bf0d032 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9c13610c-f066-478e-b8e8-013133e12b90.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8ca19a73-b5e2-4715-bb61-7f27777e14b1.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--a815f692-e5fa-4d2a-be39-077d60901c09", + "id": "bundle--50173a6e-cc88-4259-a3df-7fef14550ddb", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--9c13610c-f066-478e-b8e8-013133e12b90", - "created_by_ref": "identity--f440cf48-92fb-4282-a1dd-537fbffd6c24", - "created": "2022-06-29T15:07:39.62148Z", - "modified": "2022-06-29T15:07:39.62148Z", + "id": "attack-pattern--8ca19a73-b5e2-4715-bb61-7f27777e14b1", + "created_by_ref": "identity--efb531aa-da43-4bd3-b767-47d2fdfb3c3f", + "created": "2022-07-01T03:29:17.10311Z", + "modified": "2022-07-01T03:29:17.10311Z", "name": "Prepare fundraising campaigns", - "description": "TA04", + "description": "TA15", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-networks" + "phase_name": "establish-social-assets" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--0d0758c5-7c67-4b99-a691-161650d220c7" + "marking-definition--5e84c2ef-d66e-4d32-b59b-524af19cdcce" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0527b90a-1628-48ee-9a63-b9fa8af1f05e.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8e05e3e1-beaa-49b9-a2f1-7200d363a900.json similarity index 60% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--0527b90a-1628-48ee-9a63-b9fa8af1f05e.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--8e05e3e1-beaa-49b9-a2f1-7200d363a900.json index 557245c..4eb3c09 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0527b90a-1628-48ee-9a63-b9fa8af1f05e.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--8e05e3e1-beaa-49b9-a2f1-7200d363a900.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--9ec29aa1-27f8-4610-87d8-84cd127d5e41", + "id": "bundle--13c09030-04ef-4946-aab1-d5038669290b", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--0527b90a-1628-48ee-9a63-b9fa8af1f05e", - "created_by_ref": "identity--8a2b8d9d-b740-4810-aabd-16072cdf0f97", - "created": "2022-06-29T15:07:39.652346Z", - "modified": "2022-06-29T15:07:39.652346Z", - "name": "Muzzle social media as a political force", - "description": "TA09", + "id": "attack-pattern--8e05e3e1-beaa-49b9-a2f1-7200d363a900", + "created_by_ref": "identity--cd267b72-9ade-4cb3-816d-db8785ecbccd", + "created": "2022-07-01T03:29:17.110895Z", + "modified": "2022-07-01T03:29:17.110895Z", + "name": "Censor social media as a political force", + "description": "TA18", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "exposure" + "phase_name": "drive-online-harms" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--42cb73d0-14c4-44e2-a722-466ca266ee78" + "marking-definition--054e01ae-7378-415b-85cc-7f3751559c03" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a0e45e50-f5c8-4a62-99f8-ac66d384c8dc.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9164934b-19e2-4516-a792-5d5f08b06d34.json similarity index 64% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--a0e45e50-f5c8-4a62-99f8-ac66d384c8dc.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--9164934b-19e2-4516-a792-5d5f08b06d34.json index 42fde11..c7074c3 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a0e45e50-f5c8-4a62-99f8-ac66d384c8dc.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9164934b-19e2-4516-a792-5d5f08b06d34.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--fedd1295-243d-4f7b-8b83-2a15b2b454d3", + "id": "bundle--d890294d-b027-46ed-883c-65a79df7896c", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--a0e45e50-f5c8-4a62-99f8-ac66d384c8dc", - "created_by_ref": "identity--0fd268e7-8d8f-43de-b2bf-0fc25740704e", - "created": "2022-06-29T15:07:39.6125Z", - "modified": "2022-06-29T15:07:39.6125Z", + "id": "attack-pattern--9164934b-19e2-4516-a792-5d5f08b06d34", + "created_by_ref": "identity--396f6b80-8694-4493-9336-c4037a980f18", + "created": "2022-07-01T03:29:17.099805Z", + "modified": "2022-07-01T03:29:17.099805Z", "name": "Leverage Existing Narratives", - "description": "TA01", + "description": "TA14", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "strategic-planning" + "phase_name": "develop-narratives" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--86ff77e1-75f8-4c01-80cb-de61dcbcf86a" + "marking-definition--745557fb-5156-4f7d-bfe4-184c9c076280" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--93c39fc5-412f-44b7-a1a1-badc8a1bca3a.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--93c39fc5-412f-44b7-a1a1-badc8a1bca3a.json new file mode 100644 index 0000000..c5b47d7 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--93c39fc5-412f-44b7-a1a1-badc8a1bca3a.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--cee0e55d-93ab-4960-b9fd-54dbc41fc275", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--93c39fc5-412f-44b7-a1a1-badc8a1bca3a", + "created_by_ref": "identity--ff3177e1-cb74-49f6-92d9-9760994d1245", + "created": "2022-07-01T03:29:17.139611Z", + "modified": "2022-07-01T03:29:17.139611Z", + "name": "Suppress Opposition", + "description": "TA18", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "drive-online-harms" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0124.md", + "external_id": "T0124" + } + ], + "object_marking_refs": [ + "marking-definition--374994be-2311-4e29-91b4-8e46d3a733d6" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--955864ba-e10a-4456-8349-2bc7858bc990.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--955864ba-e10a-4456-8349-2bc7858bc990.json deleted file mode 100644 index b6cb35a..0000000 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--955864ba-e10a-4456-8349-2bc7858bc990.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--08048c8b-30ee-43e5-8632-ddf50fb48002", - "objects": [ - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--955864ba-e10a-4456-8349-2bc7858bc990", - "created_by_ref": "identity--bf9e05c5-5314-49db-b2e1-8f22fd1ffe9e", - "created": "2022-06-29T15:07:39.637017Z", - "modified": "2022-06-29T15:07:39.637017Z", - "name": "YouTube", - "description": "TA07", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0031.md", - "external_id": "T0031" - } - ], - "object_marking_refs": [ - "marking-definition--9888dac6-7b56-436b-b276-ea7774d33d22" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - } - ] -} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7b39572f-5feb-4cb5-87f0-acfce31b5628.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--966328aa-86fd-4f90-85da-0685b146c1ac.json similarity index 56% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--7b39572f-5feb-4cb5-87f0-acfce31b5628.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--966328aa-86fd-4f90-85da-0685b146c1ac.json index f16956e..0dea26f 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--7b39572f-5feb-4cb5-87f0-acfce31b5628.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--966328aa-86fd-4f90-85da-0685b146c1ac.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--ad0d7eeb-81d9-4790-8447-7e0b308cee43", + "id": "bundle--2977dab6-c70a-492b-b26d-88cbef3bfe5f", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--7b39572f-5feb-4cb5-87f0-acfce31b5628", - "created_by_ref": "identity--e7ec42e4-3697-4b94-a995-56ffa9abd4a5", - "created": "2022-06-29T15:07:39.642437Z", - "modified": "2022-06-29T15:07:39.642437Z", - "name": "Facebook", + "id": "attack-pattern--966328aa-86fd-4f90-85da-0685b146c1ac", + "created_by_ref": "identity--d103d1d9-e3c8-4796-903e-067a5d929aff", + "created": "2022-07-01T03:29:17.130301Z", + "modified": "2022-07-01T03:29:17.130301Z", + "name": "Social Networks", "description": "TA07", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" + "phase_name": "select-channels-and-affordances" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0037.md", - "external_id": "T0037" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0104.md", + "external_id": "T0104" } ], "object_marking_refs": [ - "marking-definition--c3d60b27-9ab5-4502-a47e-81c7dec8d054" + "marking-definition--ad51d9d0-5a1c-4bd2-8bac-ccc2d5f01161" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--96852c01-94f7-465f-9d58-acc33148b15c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--96852c01-94f7-465f-9d58-acc33148b15c.json deleted file mode 100644 index e671cbd..0000000 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--96852c01-94f7-465f-9d58-acc33148b15c.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--d753d6b7-e417-436a-9a70-935f9c418995", - "objects": [ - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--96852c01-94f7-465f-9d58-acc33148b15c", - "created_by_ref": "identity--e5ac1460-477f-4765-be1e-40f8e6882e5c", - "created": "2022-06-29T15:07:39.643889Z", - "modified": "2022-06-29T15:07:39.643889Z", - "name": "Twitter", - "description": "TA07", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0038.md", - "external_id": "T0038" - } - ], - "object_marking_refs": [ - "marking-definition--1cc171db-ad4b-4ebf-8b4a-0299906b7d09" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - } - ] -} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--970f3833-768b-4789-b6f3-8158c240e6c1.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--970f3833-768b-4789-b6f3-8158c240e6c1.json new file mode 100644 index 0000000..7044d40 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--970f3833-768b-4789-b6f3-8158c240e6c1.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--b962d316-97dc-4090-8127-4bf55a3eca96", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--970f3833-768b-4789-b6f3-8158c240e6c1", + "created_by_ref": "identity--4cae941b-6bdd-41bd-8c00-1231cf53eaef", + "created": "2022-07-01T03:29:17.132595Z", + "modified": "2022-07-01T03:29:17.132595Z", + "name": "Consumer Review Networks", + "description": "TA07", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "select-channels-and-affordances" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0109.md", + "external_id": "T0109" + } + ], + "object_marking_refs": [ + "marking-definition--19909584-6abf-42d1-985b-231aa5609359" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fc64a9ea-e918-4234-a887-197783cf1b24.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--976326b8-9bb8-4762-bf85-2e463a534f80.json similarity index 66% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--fc64a9ea-e918-4234-a887-197783cf1b24.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--976326b8-9bb8-4762-bf85-2e463a534f80.json index 8c53855..5742960 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fc64a9ea-e918-4234-a887-197783cf1b24.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--976326b8-9bb8-4762-bf85-2e463a534f80.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--1062ab65-70d9-4627-ae8d-d1cbfa827f7c", + "id": "bundle--79ce85e0-b173-4aa9-8c7d-ac28cfaa0e27", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--fc64a9ea-e918-4234-a887-197783cf1b24", - "created_by_ref": "identity--4c0cfcee-6771-424a-9949-048a1eb143ec", - "created": "2022-06-29T15:07:39.649313Z", - "modified": "2022-06-29T15:07:39.649313Z", + "id": "attack-pattern--976326b8-9bb8-4762-bf85-2e463a534f80", + "created_by_ref": "identity--72e1d4d3-1b4f-40cb-8486-7fa17d59d4fe", + "created": "2022-07-01T03:29:17.109537Z", + "modified": "2022-07-01T03:29:17.109537Z", "name": "Seed distortions", "description": "TA08", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "pump-priming" + "phase_name": "conduct-pump-priming" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--da4bb9c7-d6f4-477d-80a7-e5770ec4e3fa" + "marking-definition--8aee4ccb-7e2e-462f-8ae7-41f424c8c8f4" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4692326b-924e-4b2f-9eca-3ecd9d7ec1be.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9988cf65-495c-4880-95c1-f660858e7939.json similarity index 60% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--4692326b-924e-4b2f-9eca-3ecd9d7ec1be.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--9988cf65-495c-4880-95c1-f660858e7939.json index 0389084..c586874 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--4692326b-924e-4b2f-9eca-3ecd9d7ec1be.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9988cf65-495c-4880-95c1-f660858e7939.json @@ -1,15 +1,15 @@ { "type": "bundle", - "id": "bundle--2c29b550-500b-4bef-9856-8c320bffec06", + "id": "bundle--b3563046-a463-4221-87e9-4cded436c5c9", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--4692326b-924e-4b2f-9eca-3ecd9d7ec1be", - "created_by_ref": "identity--a1c6522c-1e7e-4772-928e-a3320546fbd7", - "created": "2022-06-29T15:07:39.633485Z", - "modified": "2022-06-29T15:07:39.633485Z", - "name": "Adapt existing narratives", + "id": "attack-pattern--9988cf65-495c-4880-95c1-f660858e7939", + "created_by_ref": "identity--c48b52b0-b82d-4bda-98c7-01a8f94a99ba", + "created": "2022-07-01T03:29:17.121437Z", + "modified": "2022-07-01T03:29:17.121437Z", + "name": "Develop Text-based Content", "description": "TA06", "kill_chain_phases": [ { @@ -20,12 +20,12 @@ "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0027.md", - "external_id": "T0027" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0085.md", + "external_id": "T0085" } ], "object_marking_refs": [ - "marking-definition--01a4145b-c9f6-46e4-bdb9-4978f47b8868" + "marking-definition--728e63f8-bd2b-4daa-a1cc-bd368c32ed74" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--99eb03c9-985f-4c62-9c07-d20939f7beb6.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--99eb03c9-985f-4c62-9c07-d20939f7beb6.json new file mode 100644 index 0000000..00a3258 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--99eb03c9-985f-4c62-9c07-d20939f7beb6.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--c324b9ec-cc3e-4199-9367-0ecaf9293866", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--99eb03c9-985f-4c62-9c07-d20939f7beb6", + "created_by_ref": "identity--c98c629f-8200-4d6c-bd09-efb9809fafd9", + "created": "2022-07-01T03:29:17.131683Z", + "modified": "2022-07-01T03:29:17.131683Z", + "name": "Bookmarking and Content Curation", + "description": "TA07", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "select-channels-and-affordances" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0107.md", + "external_id": "T0107" + } + ], + "object_marking_refs": [ + "marking-definition--b2249aa7-99b9-4ff6-8491-e806868349e5" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--18f72131-588a-45b9-9c27-e98d8afc3894.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a0c6c1cb-b4b6-4f91-ba68-489a7fcf2b9b.json similarity index 56% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--18f72131-588a-45b9-9c27-e98d8afc3894.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--a0c6c1cb-b4b6-4f91-ba68-489a7fcf2b9b.json index 9ab8d25..5e6a0e9 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--18f72131-588a-45b9-9c27-e98d8afc3894.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a0c6c1cb-b4b6-4f91-ba68-489a7fcf2b9b.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--a4f43e36-4a77-48d1-bfcb-cf6a17a40e45", + "id": "bundle--514567f0-30f3-4f97-9b7b-7d7ab98aa190", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--18f72131-588a-45b9-9c27-e98d8afc3894", - "created_by_ref": "identity--beb9c87a-7b02-47ee-9bdc-fcc81dbefc06", - "created": "2022-06-29T15:07:39.666666Z", - "modified": "2022-06-29T15:07:39.666666Z", - "name": "Message reach", + "id": "attack-pattern--a0c6c1cb-b4b6-4f91-ba68-489a7fcf2b9b", + "created_by_ref": "identity--5bf5359f-d86d-462a-9231-ec13db821278", + "created": "2022-07-01T03:29:17.143249Z", + "modified": "2022-07-01T03:29:17.143249Z", + "name": "Measure Performance", "description": "TA12", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "measure-effectiveness" + "phase_name": "assess-effectiveness" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0063.md", - "external_id": "T0063" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0132.md", + "external_id": "T0132" } ], "object_marking_refs": [ - "marking-definition--eef2db77-ca5e-45b6-b527-8621c5ee7fe8" + "marking-definition--7006fd01-2469-4378-8f80-02f3b2632f4d" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a85945cc-b898-433a-be92-eca07ec1aa91.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a85945cc-b898-433a-be92-eca07ec1aa91.json deleted file mode 100644 index eb73b6c..0000000 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--a85945cc-b898-433a-be92-eca07ec1aa91.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--83252cd1-8c42-4dc4-95b2-20df70100f39", - "objects": [ - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--a85945cc-b898-433a-be92-eca07ec1aa91", - "created_by_ref": "identity--575dfd43-182b-4124-a79d-46cf773eb1d6", - "created": "2022-06-29T15:07:39.654957Z", - "modified": "2022-06-29T15:07:39.654957Z", - "name": "Cheerleading domestic social media ops", - "description": "TA09", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "exposure" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0050.md", - "external_id": "T0050" - } - ], - "object_marking_refs": [ - "marking-definition--2baad641-b04a-493e-9bf1-5eb7e5b2cbf5" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - } - ] -} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--aa45be8a-db0f-422f-96d0-9959091d70b6.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--aa45be8a-db0f-422f-96d0-9959091d70b6.json new file mode 100644 index 0000000..61d2690 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--aa45be8a-db0f-422f-96d0-9959091d70b6.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--eebf622c-30f4-4aa1-91df-e31e75cd2d0e", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--aa45be8a-db0f-422f-96d0-9959091d70b6", + "created_by_ref": "identity--a9de2212-e29b-40c5-a5f2-96262b6ab411", + "created": "2022-07-01T03:29:17.120074Z", + "modified": "2022-07-01T03:29:17.120074Z", + "name": "Develop New Narratives", + "description": "TA14", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "develop-narratives" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0082.md", + "external_id": "T0082" + } + ], + "object_marking_refs": [ + "marking-definition--5395b9fe-bc52-4781-a8d7-b2e89efffb7d" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ab0f7411-ff09-4897-b55c-301fdd6276b8.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ab0f7411-ff09-4897-b55c-301fdd6276b8.json new file mode 100644 index 0000000..90300da --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ab0f7411-ff09-4897-b55c-301fdd6276b8.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--07f16915-d71d-4b6b-b3ce-9e14c58be86a", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--ab0f7411-ff09-4897-b55c-301fdd6276b8", + "created_by_ref": "identity--3b10ff39-a4f1-461b-9b82-26e85d98d99d", + "created": "2022-07-01T03:29:17.126065Z", + "modified": "2022-07-01T03:29:17.126065Z", + "name": "Develop Owned Media Assets", + "description": "TA15", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-social-assets" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0095.md", + "external_id": "T0095" + } + ], + "object_marking_refs": [ + "marking-definition--2c194b27-329e-41fb-98ed-df4f06db3141" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ad9ae97c-340b-4e33-96fe-ee0ad1407eb0.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ad9ae97c-340b-4e33-96fe-ee0ad1407eb0.json new file mode 100644 index 0000000..67f8ed8 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ad9ae97c-340b-4e33-96fe-ee0ad1407eb0.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--3acc4032-8203-4757-a13d-70269a4dd279", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--ad9ae97c-340b-4e33-96fe-ee0ad1407eb0", + "created_by_ref": "identity--533564df-a233-45cc-a4bd-67dde9b464a3", + "created": "2022-07-01T03:29:17.117798Z", + "modified": "2022-07-01T03:29:17.117798Z", + "name": "Distract", + "description": "TA02", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0077.md", + "external_id": "T0077" + } + ], + "object_marking_refs": [ + "marking-definition--08870f86-287a-418d-aec3-1e5ccf8543b7" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--30280325-59ca-4e5e-adef-8f5cc26bcdb7.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--adee13dd-8bd5-4738-91b1-3997cf7bd994.json similarity index 64% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--30280325-59ca-4e5e-adef-8f5cc26bcdb7.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--adee13dd-8bd5-4738-91b1-3997cf7bd994.json index 407bce9..769e518 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--30280325-59ca-4e5e-adef-8f5cc26bcdb7.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--adee13dd-8bd5-4738-91b1-3997cf7bd994.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--a48632b7-5438-44e8-b07e-d2e0b0c8a925", + "id": "bundle--973d9f57-04c6-4ec6-b7c7-35a3eb1b6fc1", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--30280325-59ca-4e5e-adef-8f5cc26bcdb7", - "created_by_ref": "identity--262785cd-a416-4796-b07f-a370de05f5e1", - "created": "2022-06-29T15:07:39.627103Z", - "modified": "2022-06-29T15:07:39.627103Z", + "id": "attack-pattern--adee13dd-8bd5-4738-91b1-3997cf7bd994", + "created_by_ref": "identity--6edc8264-41c1-46ae-8a0e-6090e4211029", + "created": "2022-07-01T03:29:17.10585Z", + "modified": "2022-07-01T03:29:17.10585Z", "name": "Trial content", - "description": "TA06", + "description": "TA08", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-content" + "phase_name": "conduct-pump-priming" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--bb9d31d5-7bcf-404b-b61c-55a15d828423" + "marking-definition--f4cdda6a-56d0-45ea-84b2-3fc6aa953f27" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b25838c1-95b5-4c31-a1bc-f4b5e4994854.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b25838c1-95b5-4c31-a1bc-f4b5e4994854.json new file mode 100644 index 0000000..313246c --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b25838c1-95b5-4c31-a1bc-f4b5e4994854.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--b32a3b76-2863-4b5a-9355-541a44b338c3", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--b25838c1-95b5-4c31-a1bc-f4b5e4994854", + "created_by_ref": "identity--a5fd4261-af1c-4f01-8c80-548a054a1235", + "created": "2022-07-01T03:29:17.122823Z", + "modified": "2022-07-01T03:29:17.122823Z", + "name": "Develop Audio-based Content", + "description": "TA06", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "develop-content" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0088.md", + "external_id": "T0088" + } + ], + "object_marking_refs": [ + "marking-definition--3fb5f453-07e4-433f-8e63-158bc202fec8" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b463d063-b47b-42ad-ae6c-63ddf738b509.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b499ae71-92f2-41b4-94f1-a3c061a96871.json similarity index 62% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--b463d063-b47b-42ad-ae6c-63ddf738b509.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--b499ae71-92f2-41b4-94f1-a3c061a96871.json index 3942974..b682ca7 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b463d063-b47b-42ad-ae6c-63ddf738b509.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b499ae71-92f2-41b4-94f1-a3c061a96871.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--7cdf2872-ea4f-4525-a028-1506f282353a", + "id": "bundle--f66d4c20-f91e-4006-9901-e6f8403f7087", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--b463d063-b47b-42ad-ae6c-63ddf738b509", - "created_by_ref": "identity--81ae2c07-7ef0-40ef-b13e-3c693905a251", - "created": "2022-06-29T15:07:39.66387Z", - "modified": "2022-06-29T15:07:39.66387Z", - "name": "Continue to amplify", + "id": "attack-pattern--b499ae71-92f2-41b4-94f1-a3c061a96871", + "created_by_ref": "identity--7c5a1256-d940-4fd2-ab27-0072959a20bd", + "created": "2022-07-01T03:29:17.113212Z", + "modified": "2022-07-01T03:29:17.113212Z", + "name": "Continue to Amplify", "description": "TA11", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "persistence" + "phase_name": "persist-in-the-information-environment" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--25772063-9811-4713-a2d4-6136c3dd1a84" + "marking-definition--31e37208-2a7d-43c4-b831-7e3462c2b2ee" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b725fa2e-779d-44e5-a0f4-4724d14b6deb.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b725fa2e-779d-44e5-a0f4-4724d14b6deb.json new file mode 100644 index 0000000..686194a --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--b725fa2e-779d-44e5-a0f4-4724d14b6deb.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--585ebcba-fe32-48ee-86aa-0ca2f6504585", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--b725fa2e-779d-44e5-a0f4-4724d14b6deb", + "created_by_ref": "identity--ec724bf6-a7e7-4496-8a1e-fa9e4cf5c8a4", + "created": "2022-07-01T03:29:17.106312Z", + "modified": "2022-07-01T03:29:17.106312Z", + "name": "Leverage Conspiracy Theory Narratives", + "description": "TA14", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "develop-narratives" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0022.md", + "external_id": "T0022" + } + ], + "object_marking_refs": [ + "marking-definition--8d89ab9d-c93f-4f24-9f64-c117bbc52cf0" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0a778eec-5cdd-4a35-a178-6453d9295c71.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bc6b823b-8a40-4ba3-99ab-0092341f2cc6.json similarity index 57% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--0a778eec-5cdd-4a35-a178-6453d9295c71.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--bc6b823b-8a40-4ba3-99ab-0092341f2cc6.json index d74124c..53fc789 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--0a778eec-5cdd-4a35-a178-6453d9295c71.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bc6b823b-8a40-4ba3-99ab-0092341f2cc6.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--71a24b52-352f-4a43-83db-fb1b56b0f54e", + "id": "bundle--f30bf51a-20f3-4af6-91e1-9d979966463f", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--0a778eec-5cdd-4a35-a178-6453d9295c71", - "created_by_ref": "identity--36599099-8622-4849-bda0-6f36fe4420e5", - "created": "2022-06-29T15:07:39.658726Z", - "modified": "2022-06-29T15:07:39.658726Z", - "name": "Twitter bots amplify", + "id": "attack-pattern--bc6b823b-8a40-4ba3-99ab-0092341f2cc6", + "created_by_ref": "identity--147a00a2-3f5b-49ce-9d1e-78a6780d7d81", + "created": "2022-07-01T03:29:17.135439Z", + "modified": "2022-07-01T03:29:17.135439Z", + "name": "Post Content", "description": "TA09", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "exposure" + "phase_name": "deliver-content" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0054.md", - "external_id": "T0054" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0115.md", + "external_id": "T0115" } ], "object_marking_refs": [ - "marking-definition--e14b09fe-550c-4303-8560-679ebd896b10" + "marking-definition--87fb19be-2eab-4cb0-92c0-950b415b07d2" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bd05490e-2878-4429-8733-11ba701979d3.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bd05490e-2878-4429-8733-11ba701979d3.json deleted file mode 100644 index afc199a..0000000 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bd05490e-2878-4429-8733-11ba701979d3.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--cb7b6997-daa4-4c5d-af27-ecaf67fe7ab9", - "objects": [ - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--bd05490e-2878-4429-8733-11ba701979d3", - "created_by_ref": "identity--1ee45a95-6500-45a3-8ef1-0f02c522e97b", - "created": "2022-06-29T15:07:39.634308Z", - "modified": "2022-06-29T15:07:39.634308Z", - "name": "Create competing narratives", - "description": "TA06", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "develop-content" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0028.md", - "external_id": "T0028" - } - ], - "object_marking_refs": [ - "marking-definition--2b2ce021-2309-4394-9096-87853a7c8294" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - } - ] -} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bd436c13-0ab4-4b4b-a845-ae87918a04e8.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bd436c13-0ab4-4b4b-a845-ae87918a04e8.json new file mode 100644 index 0000000..3796670 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bd436c13-0ab4-4b4b-a845-ae87918a04e8.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--5912aa97-6307-4f39-83ff-5c15f9c50f80", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--bd436c13-0ab4-4b4b-a845-ae87918a04e8", + "created_by_ref": "identity--dd4a264b-4dc5-4e7f-9cb1-41d62ff84fe4", + "created": "2022-07-01T03:29:17.139152Z", + "modified": "2022-07-01T03:29:17.139152Z", + "name": "Control Information Environment through Offensive Cyberspace Operations", + "description": "TA18", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "drive-online-harms" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0123.md", + "external_id": "T0123" + } + ], + "object_marking_refs": [ + "marking-definition--7ad306b6-8013-4090-b62a-ddad48b77c66" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--00aabe3c-19ef-4658-aec6-0bbf2fc9a675.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--be4cb928-74dd-4243-bae4-c1bb10540fcc.json similarity index 60% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--00aabe3c-19ef-4658-aec6-0bbf2fc9a675.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--be4cb928-74dd-4243-bae4-c1bb10540fcc.json index 097a760..d163307 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--00aabe3c-19ef-4658-aec6-0bbf2fc9a675.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--be4cb928-74dd-4243-bae4-c1bb10540fcc.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--ab91d552-959c-401f-ae78-f47cf043ed41", + "id": "bundle--818540dc-2f8d-4559-84a2-ce295e49b8e0", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--00aabe3c-19ef-4658-aec6-0bbf2fc9a675", - "created_by_ref": "identity--04f085f5-9ea4-4cf2-a187-57431fe27396", - "created": "2022-06-29T15:07:39.6456Z", - "modified": "2022-06-29T15:07:39.6456Z", - "name": "Demand unsurmountable proof", - "description": "TA08", + "id": "attack-pattern--be4cb928-74dd-4243-bae4-c1bb10540fcc", + "created_by_ref": "identity--0f426ba3-e76e-45e4-8e42-3fca3f75d09a", + "created": "2022-07-01T03:29:17.10816Z", + "modified": "2022-07-01T03:29:17.10816Z", + "name": "Demand insurmountable proof", + "description": "TA14", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "pump-priming" + "phase_name": "develop-narratives" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--2e6feaa4-0c79-4474-b380-c16ffdd4799e" + "marking-definition--813c3ad8-34c8-488c-b3f7-7cf05abb3f41" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bc94c49f-2121-4e3b-8f1a-8a72d9df4f8d.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c50c3595-ae68-4e13-8b76-40359cd0846a.json similarity index 60% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--bc94c49f-2121-4e3b-8f1a-8a72d9df4f8d.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--c50c3595-ae68-4e13-8b76-40359cd0846a.json index cc0089b..53dce11 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bc94c49f-2121-4e3b-8f1a-8a72d9df4f8d.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c50c3595-ae68-4e13-8b76-40359cd0846a.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--5f9543c6-3793-4cb9-8c80-76a7d65a90ed", + "id": "bundle--3214e70e-4b52-4347-8bd6-e3063828ea18", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--bc94c49f-2121-4e3b-8f1a-8a72d9df4f8d", - "created_by_ref": "identity--1649545c-f9ba-40d6-8819-527b358f0320", - "created": "2022-06-29T15:07:39.668156Z", - "modified": "2022-06-29T15:07:39.668156Z", - "name": "Use physical broadcast capabilities", - "description": "TA04", + "id": "attack-pattern--c50c3595-ae68-4e13-8b76-40359cd0846a", + "created_by_ref": "identity--24f42049-ba0d-4bc3-8a8a-1121fb44228c", + "created": "2022-07-01T03:29:17.114138Z", + "modified": "2022-07-01T03:29:17.114138Z", + "name": "Prepare Physical Broadcast Capabilities", + "description": "TA15", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-networks" + "phase_name": "establish-social-assets" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--b37e3f6b-8488-45e6-acaf-35add129b24c" + "marking-definition--66721b32-473e-4f07-b524-25780f47c326" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1c8f05cf-413d-49a3-94b6-58a7a98d7ef8.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c9156db4-b6b2-485b-bac1-a31516bea444.json similarity index 56% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--1c8f05cf-413d-49a3-94b6-58a7a98d7ef8.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--c9156db4-b6b2-485b-bac1-a31516bea444.json index c47c74c..1d183d6 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--1c8f05cf-413d-49a3-94b6-58a7a98d7ef8.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--c9156db4-b6b2-485b-bac1-a31516bea444.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--e37eaf68-2233-4a20-8ba4-96186150fa05", + "id": "bundle--6dec20f5-54e3-42f4-ad00-3ba0b927734f", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--1c8f05cf-413d-49a3-94b6-58a7a98d7ef8", - "created_by_ref": "identity--63b90850-3d52-40de-829f-b0a109696675", - "created": "2022-06-29T15:07:39.655847Z", - "modified": "2022-06-29T15:07:39.655847Z", - "name": "Fabricate social media comment", + "id": "attack-pattern--c9156db4-b6b2-485b-bac1-a31516bea444", + "created_by_ref": "identity--2bef3f55-6ce0-44da-acde-3a7855a38291", + "created": "2022-07-01T03:29:17.136363Z", + "modified": "2022-07-01T03:29:17.136363Z", + "name": "Attract Traditional Media", "description": "TA09", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "exposure" + "phase_name": "deliver-content" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0051.md", - "external_id": "T0051" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0117.md", + "external_id": "T0117" } ], "object_marking_refs": [ - "marking-definition--9dbb9ca6-8a99-4387-b8c1-0612364eba1d" + "marking-definition--96aa2ed8-9c51-4307-88fc-441d79e72b72" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d8f9fdb1-cdf0-48b3-842b-67a7f8e8c1c7.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce2ffeb8-df39-425b-992e-57d0b11174ca.json similarity index 60% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--d8f9fdb1-cdf0-48b3-842b-67a7f8e8c1c7.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce2ffeb8-df39-425b-992e-57d0b11174ca.json index 3676388..380a588 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d8f9fdb1-cdf0-48b3-842b-67a7f8e8c1c7.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ce2ffeb8-df39-425b-992e-57d0b11174ca.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--2fc7fc1d-bf6c-4e1b-9a7e-5b3b7ace8405", + "id": "bundle--e0a51b4b-e407-45f3-8f0c-9f3e6149ae7b", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--d8f9fdb1-cdf0-48b3-842b-67a7f8e8c1c7", - "created_by_ref": "identity--e9fbc051-1c09-4c86-a61e-8c0d2a4bad77", - "created": "2022-06-29T15:07:39.618689Z", - "modified": "2022-06-29T15:07:39.618689Z", - "name": "Compromise legitimate account", - "description": "TA04", + "id": "attack-pattern--ce2ffeb8-df39-425b-992e-57d0b11174ca", + "created_by_ref": "identity--2a6fb1d5-2fd2-46be-bf0a-2b7735791652", + "created": "2022-07-01T03:29:17.102189Z", + "modified": "2022-07-01T03:29:17.102189Z", + "name": "Compromise legitimate accounts", + "description": "TA16", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-networks" + "phase_name": "establish-legitimacy" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--0d732177-3798-4fa8-92c8-20eae733bdce" + "marking-definition--c64ec293-b524-48c2-8e90-1359a1052d21" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--cf006959-4d30-4dad-a7fa-22daadc54815.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--cf006959-4d30-4dad-a7fa-22daadc54815.json deleted file mode 100644 index 809fac2..0000000 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--cf006959-4d30-4dad-a7fa-22daadc54815.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--819d266d-8108-4c61-843c-c9a12bb5b9a5", - "objects": [ - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--cf006959-4d30-4dad-a7fa-22daadc54815", - "created_by_ref": "identity--a1ff5fb1-dbfe-4a40-b1cf-66e724081929", - "created": "2022-06-29T15:07:39.632662Z", - "modified": "2022-06-29T15:07:39.632662Z", - "name": "Create pseudoscientific or disingenuous research", - "description": "TA06", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "develop-content" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0026.md", - "external_id": "T0026" - } - ], - "object_marking_refs": [ - "marking-definition--a700a9ee-fadb-47dd-a8b7-cef31d7bf29f" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - } - ] -} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bc725cb5-9c6a-42da-880b-b6e0eacaf546.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d053b450-19a8-44c7-a847-6fd11ba6f69a.json similarity index 61% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--bc725cb5-9c6a-42da-880b-b6e0eacaf546.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--d053b450-19a8-44c7-a847-6fd11ba6f69a.json index 11eacc5..afbec36 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--bc725cb5-9c6a-42da-880b-b6e0eacaf546.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d053b450-19a8-44c7-a847-6fd11ba6f69a.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--5aa545d3-5572-4f97-8446-e4ae612f6959", + "id": "bundle--73fbbede-ad3e-4623-9755-7bae92ed3bc1", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--bc725cb5-9c6a-42da-880b-b6e0eacaf546", - "created_by_ref": "identity--9bc3e2bc-a39d-46e5-bc80-83c740de79f1", - "created": "2022-06-29T15:07:39.65319Z", - "modified": "2022-06-29T15:07:39.65319Z", - "name": "Cow online opinion leaders", - "description": "TA09", + "id": "attack-pattern--d053b450-19a8-44c7-a847-6fd11ba6f69a", + "created_by_ref": "identity--54dddb49-ea23-4b28-959d-d68f3ffe6964", + "created": "2022-07-01T03:29:17.111351Z", + "modified": "2022-07-01T03:29:17.111351Z", + "name": "Harass", + "description": "TA18", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "exposure" + "phase_name": "drive-online-harms" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--e68b79a3-2136-4a07-80bb-7b4b50e17f29" + "marking-definition--53bfe890-fcbd-4e0a-a085-76874996797a" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d1d9fbc5-1a0d-4c54-9284-b4254b2aedcb.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d1d9fbc5-1a0d-4c54-9284-b4254b2aedcb.json deleted file mode 100644 index 6984b8b..0000000 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d1d9fbc5-1a0d-4c54-9284-b4254b2aedcb.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--21d837a6-cd7e-40d8-9f83-51591ea35734", - "objects": [ - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--d1d9fbc5-1a0d-4c54-9284-b4254b2aedcb", - "created_by_ref": "identity--e26ac50e-fe21-4258-acc0-c5fd2fb2c003", - "created": "2022-06-29T15:07:39.636177Z", - "modified": "2022-06-29T15:07:39.636177Z", - "name": "Backstop personas", - "description": "TA07", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0030.md", - "external_id": "T0030" - } - ], - "object_marking_refs": [ - "marking-definition--3ec1d89b-ac1c-4390-ad55-c105b4086200" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - } - ] -} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d529115b-3c95-42c2-bd2c-ca9f33aac00c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d529115b-3c95-42c2-bd2c-ca9f33aac00c.json new file mode 100644 index 0000000..e0921ee --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d529115b-3c95-42c2-bd2c-ca9f33aac00c.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--36aeec9b-a6db-4c77-9a84-a53835b4eaee", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--d529115b-3c95-42c2-bd2c-ca9f33aac00c", + "created_by_ref": "identity--b75c115a-736d-4f7e-b16e-2c77681d4355", + "created": "2022-07-01T03:29:17.140979Z", + "modified": "2022-07-01T03:29:17.140979Z", + "name": "Physical Violence", + "description": "TA10", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "drive-offline-activity" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0127.md", + "external_id": "T0127" + } + ], + "object_marking_refs": [ + "marking-definition--93c68e3b-9c3d-4734-8bc3-f5f15d277b97" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--58e8704d-e76c-4b1d-8255-a980403e2ec5.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d538394c-6e96-4019-851d-f16db761bfb9.json similarity index 55% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--58e8704d-e76c-4b1d-8255-a980403e2ec5.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--d538394c-6e96-4019-851d-f16db761bfb9.json index a58bc56..77ce82a 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--58e8704d-e76c-4b1d-8255-a980403e2ec5.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d538394c-6e96-4019-851d-f16db761bfb9.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--e1b6b6ff-5091-4bf8-9540-984c99d90ed5", + "id": "bundle--d0d9674e-0fbd-4801-878c-3888d3d09fd7", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--58e8704d-e76c-4b1d-8255-a980403e2ec5", - "created_by_ref": "identity--2851616b-dd3e-43b3-88f8-007a7f6a1532", - "created": "2022-06-29T15:07:39.673166Z", - "modified": "2022-06-29T15:07:39.673166Z", - "name": "Find echo chambers", + "id": "attack-pattern--d538394c-6e96-4019-851d-f16db761bfb9", + "created_by_ref": "identity--83f9262b-4bd1-4abd-b280-723cda0c0770", + "created": "2022-07-01T03:29:17.119171Z", + "modified": "2022-07-01T03:29:17.119171Z", + "name": "Map Target Audience Information Environment", "description": "TA13", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "conduct-center-of-gravity-analysis" + "phase_name": "target-audience-analysis" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0071.md", - "external_id": "T0071" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0080.md", + "external_id": "T0080" } ], "object_marking_refs": [ - "marking-definition--46bba0a9-84c1-436e-abed-baaa07827448" + "marking-definition--b57d8117-50dc-4f53-992c-e1dd829298cc" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d9e11aed-9dd8-4475-8ae5-8712ff59f586.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d9e11aed-9dd8-4475-8ae5-8712ff59f586.json new file mode 100644 index 0000000..5262cc3 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--d9e11aed-9dd8-4475-8ae5-8712ff59f586.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--bfe71091-824b-4a08-8ed8-e6e4fc558592", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--d9e11aed-9dd8-4475-8ae5-8712ff59f586", + "created_by_ref": "identity--d1019309-43a3-4678-9e95-0dcc6adf34db", + "created": "2022-07-01T03:29:17.116426Z", + "modified": "2022-07-01T03:29:17.116426Z", + "name": "Determine Strategic Ends", + "description": "TA01", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-strategy" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0074.md", + "external_id": "T0074" + } + ], + "object_marking_refs": [ + "marking-definition--7c51b002-f10f-4d6a-822d-4222b2b6bc2b" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--df56db91-8883-40b5-88d3-a144c2093f27.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--df56db91-8883-40b5-88d3-a144c2093f27.json new file mode 100644 index 0000000..4ccf02a --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--df56db91-8883-40b5-88d3-a144c2093f27.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--2086e881-cf65-4e2e-b3b8-81c12d75fba9", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--df56db91-8883-40b5-88d3-a144c2093f27", + "created_by_ref": "identity--350a4915-af5e-4bd0-a737-a79d6d5d527f", + "created": "2022-07-01T03:29:17.130762Z", + "modified": "2022-07-01T03:29:17.130762Z", + "name": "Media Sharing Networks", + "description": "TA07", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "select-channels-and-affordances" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0105.md", + "external_id": "T0105" + } + ], + "object_marking_refs": [ + "marking-definition--ad61e09c-a1f4-40b5-877c-2c9933937e24" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e00abc7f-5f53-487a-8562-e3ba4c6ca0b6.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e00abc7f-5f53-487a-8562-e3ba4c6ca0b6.json new file mode 100644 index 0000000..2b5d0d2 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e00abc7f-5f53-487a-8562-e3ba4c6ca0b6.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--01d3f837-cc56-405a-a9aa-64401b8e5383", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--e00abc7f-5f53-487a-8562-e3ba4c6ca0b6", + "created_by_ref": "identity--7a62d925-cec9-4cde-a5b4-e4eb5ee97b73", + "created": "2022-07-01T03:29:17.126973Z", + "modified": "2022-07-01T03:29:17.126973Z", + "name": "Create personas", + "description": "TA16", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-legitimacy" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0097.md", + "external_id": "T0097" + } + ], + "object_marking_refs": [ + "marking-definition--aa05a95c-e43f-490a-ac96-f7f0c5fe3fef" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--55a9a479-b834-4c81-9239-f75a4324b22f.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e3011cc8-6ecc-4cbd-8827-15feef09bfc5.json similarity index 64% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--55a9a479-b834-4c81-9239-f75a4324b22f.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--e3011cc8-6ecc-4cbd-8827-15feef09bfc5.json index fd7f9a9..388154e 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--55a9a479-b834-4c81-9239-f75a4324b22f.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e3011cc8-6ecc-4cbd-8827-15feef09bfc5.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--1b30a637-7975-4d7d-bf81-e8587c33aca6", + "id": "bundle--8d8aea61-f830-447a-b790-fbc9e30544c7", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--55a9a479-b834-4c81-9239-f75a4324b22f", - "created_by_ref": "identity--2b7d9f37-5747-43df-a1b2-043d15d716f6", - "created": "2022-06-29T15:07:39.617863Z", - "modified": "2022-06-29T15:07:39.617863Z", + "id": "attack-pattern--e3011cc8-6ecc-4cbd-8827-15feef09bfc5", + "created_by_ref": "identity--e2679b1b-d851-427f-8c2b-0c8269f6156e", + "created": "2022-07-01T03:29:17.101731Z", + "modified": "2022-07-01T03:29:17.101731Z", "name": "Cultivate ignorant agents", - "description": "TA04", + "description": "TA15", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "develop-networks" + "phase_name": "establish-social-assets" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--7a6c579f-0f76-4993-8822-c68202c1cb19" + "marking-definition--65e1b90e-5ed8-45b5-8831-99b8a6f56cfa" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9f7a1615-b64e-4598-8d4b-325b5cd885e7.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e46945d5-536e-4d6f-9a46-0f9b6007112d.json similarity index 63% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--9f7a1615-b64e-4598-8d4b-325b5cd885e7.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--e46945d5-536e-4d6f-9a46-0f9b6007112d.json index 9fe910b..5b8a5e1 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--9f7a1615-b64e-4598-8d4b-325b5cd885e7.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e46945d5-536e-4d6f-9a46-0f9b6007112d.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--4d966062-56b7-40f5-b5ec-98ae3cdeefef", + "id": "bundle--6bc641ba-7a4b-4a4f-9011-a85adae72770", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--9f7a1615-b64e-4598-8d4b-325b5cd885e7", - "created_by_ref": "identity--19d68843-3bfb-43e5-9181-da54e704d1f1", - "created": "2022-06-29T15:07:39.625256Z", - "modified": "2022-06-29T15:07:39.625256Z", - "name": "Purchase advertisements", + "id": "attack-pattern--e46945d5-536e-4d6f-9a46-0f9b6007112d", + "created_by_ref": "identity--2b797c80-0029-4570-8ec4-d8968e972294", + "created": "2022-07-01T03:29:17.104944Z", + "modified": "2022-07-01T03:29:17.104944Z", + "name": "Purchase Targeted Advertisements", "description": "TA05", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "microtargeting" + "phase_name": "microtarget" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--d3a79065-5187-4ea6-a7b1-b6cbbe4c2c74" + "marking-definition--1cc4f334-81f1-4aa5-94a5-cc8ecdecb207" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--11c32299-cfec-447f-9f78-935315141c50.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e5a96616-8465-4184-ac6f-09b46bdb5e1f.json similarity index 60% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--11c32299-cfec-447f-9f78-935315141c50.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--e5a96616-8465-4184-ac6f-09b46bdb5e1f.json index 9ae8a65..880eba7 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--11c32299-cfec-447f-9f78-935315141c50.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e5a96616-8465-4184-ac6f-09b46bdb5e1f.json @@ -1,15 +1,15 @@ { "type": "bundle", - "id": "bundle--45a791a1-76eb-4acf-b9ee-5924f52bbd61", + "id": "bundle--208c2fd2-373e-4b60-a9fc-ce332e5bbe9c", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--11c32299-cfec-447f-9f78-935315141c50", - "created_by_ref": "identity--c0bd9b54-2596-4b51-b1be-dd884dec665b", - "created": "2022-06-29T15:07:39.627943Z", - "modified": "2022-06-29T15:07:39.627943Z", - "name": "Memes", + "id": "attack-pattern--e5a96616-8465-4184-ac6f-09b46bdb5e1f", + "created_by_ref": "identity--b091aac5-cc47-4c38-a077-15d5acb0564c", + "created": "2022-07-01T03:29:17.120982Z", + "modified": "2022-07-01T03:29:17.120982Z", + "name": "Reuse Existing Content", "description": "TA06", "kill_chain_phases": [ { @@ -20,12 +20,12 @@ "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0021.md", - "external_id": "T0021" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0084.md", + "external_id": "T0084" } ], "object_marking_refs": [ - "marking-definition--d85a7f9d-b853-4268-8265-e41ce7590c4e" + "marking-definition--af398d8c-ff47-4d4c-b671-e73af7df50f4" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e5ca8c74-3a97-449f-b2fd-a6c68001022e.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e5ca8c74-3a97-449f-b2fd-a6c68001022e.json new file mode 100644 index 0000000..b2a6172 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e5ca8c74-3a97-449f-b2fd-a6c68001022e.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--b4d30793-ef19-4bca-9810-c416afdd5dff", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--e5ca8c74-3a97-449f-b2fd-a6c68001022e", + "created_by_ref": "identity--74764361-a0ca-4a61-b7c3-07f5589c908c", + "created": "2022-07-01T03:29:17.142343Z", + "modified": "2022-07-01T03:29:17.142343Z", + "name": "Conceal Infrastructure", + "description": "TA11", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "persist-in-the-information-environment" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0130.md", + "external_id": "T0130" + } + ], + "object_marking_refs": [ + "marking-definition--0732f928-a6d2-46c4-983f-f385a18d9c30" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e871e99b-abc1-4b1c-b00d-51c247d7d259.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e871e99b-abc1-4b1c-b00d-51c247d7d259.json deleted file mode 100644 index 9c789c6..0000000 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--e871e99b-abc1-4b1c-b00d-51c247d7d259.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--98ec593d-d0f9-4c2e-8ce2-3689f77487cb", - "objects": [ - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--e871e99b-abc1-4b1c-b00d-51c247d7d259", - "created_by_ref": "identity--4131f25c-10a7-4492-b1dd-b0170979fcdc", - "created": "2022-06-29T15:07:39.641583Z", - "modified": "2022-06-29T15:07:39.641583Z", - "name": "WhatsApp", - "description": "TA07", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0036.md", - "external_id": "T0036" - } - ], - "object_marking_refs": [ - "marking-definition--b6ccac56-44ae-4198-8096-386ddd276815" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - } - ] -} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--81201f8f-d4af-43d2-b871-1452b99ec7ea.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb6d2cf6-e0cd-446b-a1f3-2cd7b8f20162.json similarity index 60% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--81201f8f-d4af-43d2-b871-1452b99ec7ea.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb6d2cf6-e0cd-446b-a1f3-2cd7b8f20162.json index d7cf2f1..7c699d7 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--81201f8f-d4af-43d2-b871-1452b99ec7ea.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eb6d2cf6-e0cd-446b-a1f3-2cd7b8f20162.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--9be0467a-dfe6-4af0-9090-b0b80a1a0a34", + "id": "bundle--cef73dd9-2c62-4947-9606-d7b6b1e6a279", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--81201f8f-d4af-43d2-b871-1452b99ec7ea", - "created_by_ref": "identity--2f672425-274a-4338-8cf9-836a758e7d3d", - "created": "2022-06-29T15:07:39.64475Z", - "modified": "2022-06-29T15:07:39.64475Z", + "id": "attack-pattern--eb6d2cf6-e0cd-446b-a1f3-2cd7b8f20162", + "created_by_ref": "identity--10d05fd9-175e-477e-b416-1e4d9cbab465", + "created": "2022-07-01T03:29:17.107697Z", + "modified": "2022-07-01T03:29:17.107697Z", "name": "Bait legitimate influencers", "description": "TA08", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "pump-priming" + "phase_name": "conduct-pump-priming" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0039.md", - "external_id": "T0039" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0039 .md", + "external_id": "T0039 " } ], "object_marking_refs": [ - "marking-definition--8bfd8806-fd70-4654-a97a-bbdf36f0c3c0" + "marking-definition--24c4802c-ba22-42ec-8d8b-007d95cafea0" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ecfdb2b2-5841-4c61-ae57-1bfa1dd50a87.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ecfdb2b2-5841-4c61-ae57-1bfa1dd50a87.json new file mode 100644 index 0000000..17ad07e --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ecfdb2b2-5841-4c61-ae57-1bfa1dd50a87.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--6e8103af-a4c3-40a6-acb5-6908f0ac62ed", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--ecfdb2b2-5841-4c61-ae57-1bfa1dd50a87", + "created_by_ref": "identity--22a4d897-ac44-41d7-9761-d1c23a31ce28", + "created": "2022-07-01T03:29:17.127428Z", + "modified": "2022-07-01T03:29:17.127428Z", + "name": "Establish Inauthentic News Sites", + "description": "TA16", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-legitimacy" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0098.md", + "external_id": "T0098" + } + ], + "object_marking_refs": [ + "marking-definition--d684d1f9-7edd-412e-a730-e5cf08509bbf" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ed11f144-9907-4dda-8d51-f9084227b41c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ed11f144-9907-4dda-8d51-f9084227b41c.json new file mode 100644 index 0000000..b8534d1 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ed11f144-9907-4dda-8d51-f9084227b41c.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--2eacaf30-e4ff-43e0-bdd6-b139bb2159f8", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--ed11f144-9907-4dda-8d51-f9084227b41c", + "created_by_ref": "identity--1fdd359e-d9eb-42ef-851f-e8f7e907a990", + "created": "2022-07-01T03:29:17.128344Z", + "modified": "2022-07-01T03:29:17.128344Z", + "name": "Co-opt Trusted Sources", + "description": "TA16", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-legitimacy" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0100.md", + "external_id": "T0100" + } + ], + "object_marking_refs": [ + "marking-definition--06d3e445-3c4b-4a34-8641-98f8469a880c" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ee320afa-9925-4609-ba01-1b345aba7abd.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ee320afa-9925-4609-ba01-1b345aba7abd.json deleted file mode 100644 index b304558..0000000 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--ee320afa-9925-4609-ba01-1b345aba7abd.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--197bf6f2-98c2-4728-a3d1-6e3960286dc8", - "objects": [ - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--ee320afa-9925-4609-ba01-1b345aba7abd", - "created_by_ref": "identity--12032cf4-860c-4ce5-b3ed-79fe470d0691", - "created": "2022-06-29T15:07:39.669754Z", - "modified": "2022-06-29T15:07:39.669754Z", - "name": "Plan to discredit credible sources", - "description": "TA02", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "objective-planning" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0067.md", - "external_id": "T0067" - } - ], - "object_marking_refs": [ - "marking-definition--054c9054-713c-4d33-b64a-782762b19697" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - } - ] -} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eea82e81-08cd-42f7-9c3f-32d296341fee.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eea82e81-08cd-42f7-9c3f-32d296341fee.json new file mode 100644 index 0000000..d73310e --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eea82e81-08cd-42f7-9c3f-32d296341fee.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--de507323-dad4-4cc3-9c7b-d81c05620ab2", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--eea82e81-08cd-42f7-9c3f-32d296341fee", + "created_by_ref": "identity--05400086-dfff-4980-bb7d-ec94e33ae378", + "created": "2022-07-01T03:29:17.124198Z", + "modified": "2022-07-01T03:29:17.124198Z", + "name": "Recruit bad actors", + "description": "TA15", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "establish-social-assets" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0091.md", + "external_id": "T0091" + } + ], + "object_marking_refs": [ + "marking-definition--860df523-d43d-4b94-a3e7-33382331c6d5" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eedcc7f8-edec-4edb-9b08-a890cf55c907.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eedcc7f8-edec-4edb-9b08-a890cf55c907.json new file mode 100644 index 0000000..5c64d9f --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--eedcc7f8-edec-4edb-9b08-a890cf55c907.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--b407de27-0b1e-452e-b217-cfc6acfa2151", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--eedcc7f8-edec-4edb-9b08-a890cf55c907", + "created_by_ref": "identity--7f51c314-3c76-4bb9-b1e9-c43a441088a9", + "created": "2022-07-01T03:29:17.140068Z", + "modified": "2022-07-01T03:29:17.140068Z", + "name": "Platform Filtering", + "description": "TA18", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "drive-online-harms" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0125.md", + "external_id": "T0125" + } + ], + "object_marking_refs": [ + "marking-definition--aec46781-a9af-4956-ac97-90805bdd57a2" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f3d091e2-e76c-4512-a0fd-04522c0e4519.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f3d091e2-e76c-4512-a0fd-04522c0e4519.json deleted file mode 100644 index 202e0db..0000000 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f3d091e2-e76c-4512-a0fd-04522c0e4519.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--07a54ef7-d4cd-4182-9210-b533376ea7fc", - "objects": [ - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--f3d091e2-e76c-4512-a0fd-04522c0e4519", - "created_by_ref": "identity--874dbe85-12c8-46ef-b7d6-64f01e032269", - "created": "2022-06-29T15:07:39.616083Z", - "modified": "2022-06-29T15:07:39.616083Z", - "name": "Create fake or imposter news sites", - "description": "TA03", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "develop-people" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0008.md", - "external_id": "T0008" - } - ], - "object_marking_refs": [ - "marking-definition--9ce37768-60f5-4ce8-afa9-5c5b12af93e0" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - } - ] -} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f458d4eb-87c9-4c24-bfa1-f4a9467edf61.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f458d4eb-87c9-4c24-bfa1-f4a9467edf61.json deleted file mode 100644 index 280f576..0000000 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f458d4eb-87c9-4c24-bfa1-f4a9467edf61.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--29361f0d-3516-42a3-b683-92233fa194c4", - "objects": [ - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--f458d4eb-87c9-4c24-bfa1-f4a9467edf61", - "created_by_ref": "identity--66685a31-cdb4-4d34-8bbb-4a47ca520901", - "created": "2022-06-29T15:07:39.631864Z", - "modified": "2022-06-29T15:07:39.631864Z", - "name": "Leak altered documents", - "description": "TA06", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "develop-content" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0025.md", - "external_id": "T0025" - } - ], - "object_marking_refs": [ - "marking-definition--1f0dd35c-a866-49e4-828b-1b0e8ce8f4d5" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - } - ] -} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--44fb71ec-858f-4392-aa7e-308876d787ca.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f7eb387d-dc29-4961-9aa5-2ef707ef4d4e.json similarity index 56% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--44fb71ec-858f-4392-aa7e-308876d787ca.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--f7eb387d-dc29-4961-9aa5-2ef707ef4d4e.json index 0d98201..f53cd26 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--44fb71ec-858f-4392-aa7e-308876d787ca.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f7eb387d-dc29-4961-9aa5-2ef707ef4d4e.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--91915b3c-0ddd-4528-aee5-06ef048e0461", + "id": "bundle--af61493f-c6ea-4361-a862-2b5f385df49d", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--44fb71ec-858f-4392-aa7e-308876d787ca", - "created_by_ref": "identity--fc7750ea-d603-4def-b797-c2a1ce6ecd39", - "created": "2022-06-29T15:07:39.639769Z", - "modified": "2022-06-29T15:07:39.639769Z", - "name": "LinkedIn", + "id": "attack-pattern--f7eb387d-dc29-4961-9aa5-2ef707ef4d4e", + "created_by_ref": "identity--02600a7a-9c21-4d6a-91bd-65d45451d843", + "created": "2022-07-01T03:29:17.129843Z", + "modified": "2022-07-01T03:29:17.129843Z", + "name": "Livestream", "description": "TA07", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" + "phase_name": "select-channels-and-affordances" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0034.md", - "external_id": "T0034" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0103.md", + "external_id": "T0103" } ], "object_marking_refs": [ - "marking-definition--fdae8056-6642-4a17-9fe0-6cfaa22621b9" + "marking-definition--bf0180fb-de93-494f-805a-f3fceab6d48f" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f8a959f9-b687-4c31-9deb-5a06e63cd875.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f8a959f9-b687-4c31-9deb-5a06e63cd875.json deleted file mode 100644 index 532a343..0000000 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f8a959f9-b687-4c31-9deb-5a06e63cd875.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--f5284ebc-84ea-44ed-9ab3-d4226780a66d", - "objects": [ - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--f8a959f9-b687-4c31-9deb-5a06e63cd875", - "created_by_ref": "identity--283d6581-1c8a-458b-af6a-50dd0e9b8863", - "created": "2022-06-29T15:07:39.646459Z", - "modified": "2022-06-29T15:07:39.646459Z", - "name": "Deny involvement", - "description": "TA08", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "pump-priming" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0041.md", - "external_id": "T0041" - } - ], - "object_marking_refs": [ - "marking-definition--07ac7a54-b81f-4437-9ec9-9265e903bb6a" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - } - ] -} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f8c2e933-a4ba-410a-8689-d6882b92e28c.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f8c2e933-a4ba-410a-8689-d6882b92e28c.json new file mode 100644 index 0000000..ecf59d3 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--f8c2e933-a4ba-410a-8689-d6882b92e28c.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--0476b1be-804e-43b5-bd76-6995a3a64349", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--f8c2e933-a4ba-410a-8689-d6882b92e28c", + "created_by_ref": "identity--6d8fd8d9-aa56-4ae4-80fc-4a0ca136f567", + "created": "2022-07-01T03:29:17.1428Z", + "modified": "2022-07-01T03:29:17.1428Z", + "name": "Exploit TOS/Content Moderation", + "description": "TA11", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "persist-in-the-information-environment" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0131.md", + "external_id": "T0131" + } + ], + "object_marking_refs": [ + "marking-definition--3e99c627-a96e-4eef-9a2e-ce23c1e3895f" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fb0fe94e-7214-4aed-a3b8-d8e21fe0f934.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fb0fe94e-7214-4aed-a3b8-d8e21fe0f934.json new file mode 100644 index 0000000..09be995 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fb0fe94e-7214-4aed-a3b8-d8e21fe0f934.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--efb79c09-6e27-40c8-b9d2-1f4d9e377a7f", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--fb0fe94e-7214-4aed-a3b8-d8e21fe0f934", + "created_by_ref": "identity--9a50eaed-346d-429b-ab68-36d9d1883d71", + "created": "2022-07-01T03:29:17.137779Z", + "modified": "2022-07-01T03:29:17.137779Z", + "name": "Incentivize Sharing", + "description": "TA17", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "maximize-exposure" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0120.md", + "external_id": "T0120" + } + ], + "object_marking_refs": [ + "marking-definition--aac40058-3121-4869-9029-566b754482ea" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fb3dae2e-a565-4774-8471-fca6fed9d430.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fb3dae2e-a565-4774-8471-fca6fed9d430.json deleted file mode 100644 index 8e1106f..0000000 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fb3dae2e-a565-4774-8471-fca6fed9d430.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--e8b87ece-930a-4362-80b3-6956e852062f", - "objects": [ - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--fb3dae2e-a565-4774-8471-fca6fed9d430", - "created_by_ref": "identity--dc984f43-985c-47fc-8c77-9aea0e6aa070", - "created": "2022-06-29T15:07:39.631008Z", - "modified": "2022-06-29T15:07:39.631008Z", - "name": "Create fake videos and images", - "description": "TA06", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "develop-content" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0024.md", - "external_id": "T0024" - } - ], - "object_marking_refs": [ - "marking-definition--1586c8a4-d65b-4610-bdb5-9b325222311f" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - } - ] -} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fb56da5b-2a04-4d5d-8399-97b7ac04525f.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fb56da5b-2a04-4d5d-8399-97b7ac04525f.json new file mode 100644 index 0000000..58e0187 --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fb56da5b-2a04-4d5d-8399-97b7ac04525f.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--d3487217-e903-44e7-b881-3d61fef58381", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--fb56da5b-2a04-4d5d-8399-97b7ac04525f", + "created_by_ref": "identity--01935b3a-243c-4232-8366-767df5ba5d9d", + "created": "2022-07-01T03:29:17.138696Z", + "modified": "2022-07-01T03:29:17.138696Z", + "name": "Direct Users to Alternative Platforms", + "description": "TA17", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "maximize-exposure" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0122.md", + "external_id": "T0122" + } + ], + "object_marking_refs": [ + "marking-definition--98150158-c209-40ef-8f67-8b0e068283dd" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fac68697-f3ca-4638-b00f-fecc56636459.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fd260e6a-7b36-4c30-9a12-29745ec85672.json similarity index 60% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--fac68697-f3ca-4638-b00f-fecc56636459.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--fd260e6a-7b36-4c30-9a12-29745ec85672.json index aeb25c5..0993cb3 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fac68697-f3ca-4638-b00f-fecc56636459.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fd260e6a-7b36-4c30-9a12-29745ec85672.json @@ -1,20 +1,20 @@ { "type": "bundle", - "id": "bundle--bc024d3e-fb90-4787-b68a-53b5af848b92", + "id": "bundle--b4e28dde-eed6-4a8e-842a-7d31a60f3d74", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--fac68697-f3ca-4638-b00f-fecc56636459", - "created_by_ref": "identity--85232727-a150-4760-aa83-3b1bd115b3e6", - "created": "2022-06-29T15:07:39.61337Z", - "modified": "2022-06-29T15:07:39.61337Z", - "name": "Devise Competing Narratives", - "description": "TA01", + "id": "attack-pattern--fd260e6a-7b36-4c30-9a12-29745ec85672", + "created_by_ref": "identity--19e9d8d8-0dd2-42aa-a34e-17adc2be525f", + "created": "2022-07-01T03:29:17.100339Z", + "modified": "2022-07-01T03:29:17.100339Z", + "name": "Develop Competing Narratives", + "description": "TA14", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "strategic-planning" + "phase_name": "develop-narratives" } ], "external_references": [ @@ -25,7 +25,7 @@ } ], "object_marking_refs": [ - "marking-definition--25a3d95a-aa85-45cd-b06e-6ecade362f98" + "marking-definition--4ea9cf26-90ed-4b44-8a0d-43af22149baa" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fd760a8e-d115-45ee-9399-6fb9d98eabba.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fd760a8e-d115-45ee-9399-6fb9d98eabba.json deleted file mode 100644 index c9cdfa6..0000000 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fd760a8e-d115-45ee-9399-6fb9d98eabba.json +++ /dev/null @@ -1,39 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--cf0b1dc3-7e18-4f5c-81df-05e7279aa7ce", - "objects": [ - { - "type": "attack-pattern", - "spec_version": "2.1", - "id": "attack-pattern--fd760a8e-d115-45ee-9399-6fb9d98eabba", - "created_by_ref": "identity--ed36f4ba-651d-41f6-b60e-4a341b7ce4e3", - "created": "2022-06-29T15:07:39.640692Z", - "modified": "2022-06-29T15:07:39.640692Z", - "name": "Pinterest", - "description": "TA07", - "kill_chain_phases": [ - { - "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" - } - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0035.md", - "external_id": "T0035" - } - ], - "object_marking_refs": [ - "marking-definition--b3423c1e-00b2-46bd-8b74-902ddfe3b405" - ], - "x_mitre_is_subtechnique": false, - "x_mitre_platforms": [ - "Windows", - "Linux", - "Mac" - ], - "x_mitre_version": "1,0" - } - ] -} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--82e41ffb-af93-4beb-b45e-32ad1c2172ff.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fdd2573d-3ad7-4ae0-a0ff-7542978aa448.json similarity index 56% rename from generated_files/DISARM_STIX/attack-pattern/attack-pattern--82e41ffb-af93-4beb-b45e-32ad1c2172ff.json rename to generated_files/DISARM_STIX/attack-pattern/attack-pattern--fdd2573d-3ad7-4ae0-a0ff-7542978aa448.json index e2080c2..52c0e13 100644 --- a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--82e41ffb-af93-4beb-b45e-32ad1c2172ff.json +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fdd2573d-3ad7-4ae0-a0ff-7542978aa448.json @@ -1,31 +1,31 @@ { "type": "bundle", - "id": "bundle--c50eb5fb-f9ad-494c-9087-335b87192b3b", + "id": "bundle--1a2da34f-4c89-435b-9a16-02768a947c08", "objects": [ { "type": "attack-pattern", "spec_version": "2.1", - "id": "attack-pattern--82e41ffb-af93-4beb-b45e-32ad1c2172ff", - "created_by_ref": "identity--1ea15f55-3cfb-4a5b-904d-1ba50bc281dc", - "created": "2022-06-29T15:07:39.63883Z", - "modified": "2022-06-29T15:07:39.63883Z", - "name": "Instagram", + "id": "attack-pattern--fdd2573d-3ad7-4ae0-a0ff-7542978aa448", + "created_by_ref": "identity--86080875-4c7c-4777-bda0-b3493e0c2d02", + "created": "2022-07-01T03:29:17.13122Z", + "modified": "2022-07-01T03:29:17.13122Z", + "name": "Discussion Forums", "description": "TA07", "kill_chain_phases": [ { "kill_chain_name": "mitre-attack", - "phase_name": "channel-selection" + "phase_name": "select-channels-and-affordances" } ], "external_references": [ { "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0033.md", - "external_id": "T0033" + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0106.md", + "external_id": "T0106" } ], "object_marking_refs": [ - "marking-definition--5447d252-3be0-4121-9f30-86470453af86" + "marking-definition--c4cd66f6-9714-4a00-9007-5f5b13e547e2" ], "x_mitre_is_subtechnique": false, "x_mitre_platforms": [ diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fe45dbba-bd39-40a4-b62a-befd4cd7a11f.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fe45dbba-bd39-40a4-b62a-befd4cd7a11f.json new file mode 100644 index 0000000..66573cc --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fe45dbba-bd39-40a4-b62a-befd4cd7a11f.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--2e03ea85-823e-4198-9891-ca3291247db3", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--fe45dbba-bd39-40a4-b62a-befd4cd7a11f", + "created_by_ref": "identity--ce3227cb-dbca-431c-9508-bd9b38c37f02", + "created": "2022-07-01T03:29:17.116887Z", + "modified": "2022-07-01T03:29:17.116887Z", + "name": "Dismiss", + "description": "TA02", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "plan-objectives" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0075.md", + "external_id": "T0075" + } + ], + "object_marking_refs": [ + "marking-definition--a58597d6-33a8-492d-a437-fb7b94fdb267" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fef87440-2f0d-4623-b952-04f8f6712938.json b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fef87440-2f0d-4623-b952-04f8f6712938.json new file mode 100644 index 0000000..010b04b --- /dev/null +++ b/generated_files/DISARM_STIX/attack-pattern/attack-pattern--fef87440-2f0d-4623-b952-04f8f6712938.json @@ -0,0 +1,39 @@ +{ + "type": "bundle", + "id": "bundle--d67581f1-731e-406c-9ece-5152980fb623", + "objects": [ + { + "type": "attack-pattern", + "spec_version": "2.1", + "id": "attack-pattern--fef87440-2f0d-4623-b952-04f8f6712938", + "created_by_ref": "identity--5c1d10e0-6bff-4f50-8d47-2ef9197c061c", + "created": "2022-07-01T03:29:17.129378Z", + "modified": "2022-07-01T03:29:17.129378Z", + "name": "Leverage Echo Chambers/Filter Bubbles", + "description": "TA05", + "kill_chain_phases": [ + { + "kill_chain_name": "mitre-attack", + "phase_name": "microtarget" + } + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/techniques/T0102.md", + "external_id": "T0102" + } + ], + "object_marking_refs": [ + "marking-definition--7996c25b-9633-4fa2-b7c0-1afd4aa59123" + ], + "x_mitre_is_subtechnique": false, + "x_mitre_platforms": [ + "Windows", + "Linux", + "Mac" + ], + "x_mitre_version": "1,0" + } + ] +} diff --git a/generated_files/DISARM_STIX/x-mitre-matrix/x-mitre-matrix--4592a0a9-b821-47ad-b0c6-5ce63c628719.json b/generated_files/DISARM_STIX/x-mitre-matrix/x-mitre-matrix--4592a0a9-b821-47ad-b0c6-5ce63c628719.json new file mode 100644 index 0000000..7f79443 --- /dev/null +++ b/generated_files/DISARM_STIX/x-mitre-matrix/x-mitre-matrix--4592a0a9-b821-47ad-b0c6-5ce63c628719.json @@ -0,0 +1,40 @@ +{ + "type": "bundle", + "id": "bundle--e537b1a2-00a4-49bd-8a6a-88e72195bf3a", + "objects": [ + { + "type": "x-mitre-matrix", + "spec_version": "2.1", + "id": "x-mitre-matrix--4592a0a9-b821-47ad-b0c6-5ce63c628719", + "created": "2022-07-01T03:29:17.144346Z", + "modified": "2022-07-01T03:29:17.144346Z", + "name": "DISARM Framework", + "description": "DISARM is a framework designed for describing and understanding disinformation incidents.", + "tactic_refs": [ + "x-mitre-tactic--ca848c76-3e2e-4059-a61f-dce4180b4710", + "x-mitre-tactic--eec7c49a-35c0-4ed2-9161-f7dba316a609", + "x-mitre-tactic--e749a24c-8362-4fed-ba26-51e56b37b439", + "x-mitre-tactic--4348a49d-d21a-4915-a512-ba1accaa8cd9", + "x-mitre-tactic--7c9b3fa5-50f8-4fab-acc3-f984b7290cd7", + "x-mitre-tactic--f59414c8-2d4d-4d9e-8d88-fe8a339270d1", + "x-mitre-tactic--717ccb01-df67-48a8-b6ec-9551272a4ff4", + "x-mitre-tactic--b2ad03fa-b162-4161-b864-344f9cb69ad3", + "x-mitre-tactic--efddae0c-df65-48be-a7a4-067237d8a528", + "x-mitre-tactic--96ec7676-22a8-40f8-91f9-2b770fec3a78", + "x-mitre-tactic--10b904db-7568-4a50-bf6f-9541f3b01924", + "x-mitre-tactic--977b0d14-c42a-4f3e-badb-fdabb9781544", + "x-mitre-tactic--5d068e30-413a-4465-b51b-8e9fc1e18b1e", + "x-mitre-tactic--60087ffe-9390-4baf-8e93-20b3f075da8e", + "x-mitre-tactic--c4e65fa5-4f02-4075-b26f-07c0d07badaa", + "x-mitre-tactic--2fad8829-108a-4d6a-8135-6bc3bf74a770" + ], + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation", + "external_id": "DISARM" + } + ] + } + ] +} diff --git a/generated_files/DISARM_STIX/x-mitre-matrix/x-mitre-matrix--efa3ff0a-9e96-44ba-9a87-f46cc11a01c4.json b/generated_files/DISARM_STIX/x-mitre-matrix/x-mitre-matrix--efa3ff0a-9e96-44ba-9a87-f46cc11a01c4.json deleted file mode 100644 index f93e6c9..0000000 --- a/generated_files/DISARM_STIX/x-mitre-matrix/x-mitre-matrix--efa3ff0a-9e96-44ba-9a87-f46cc11a01c4.json +++ /dev/null @@ -1,37 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--77626c2c-3485-4529-b0e5-5e453af6177e", - "objects": [ - { - "type": "x-mitre-matrix", - "spec_version": "2.1", - "id": "x-mitre-matrix--efa3ff0a-9e96-44ba-9a87-f46cc11a01c4", - "created": "2022-06-29T15:07:39.674372Z", - "modified": "2022-06-29T15:07:39.674372Z", - "name": "DISARM Framework", - "description": "DISARM is a framework designed for describing and understanding disinformation incidents.", - "tactic_refs": [ - "x-mitre-tactic--45968fd4-4fdb-4ba2-82e1-f5e5c148e325", - "x-mitre-tactic--2f02c1ff-9e62-469c-a8bf-d9a6b1cc7917", - "x-mitre-tactic--49b9b288-58bb-41b8-b2b7-570e10025264", - "x-mitre-tactic--f2d0efbf-0f86-419b-917b-2f3dc904094d", - "x-mitre-tactic--a9cc9713-f33b-44a8-868b-c59950406f76", - "x-mitre-tactic--6c6c13f5-aa72-42e5-a9d2-4700306c353e", - "x-mitre-tactic--5c04a4d3-dd32-458b-952e-1e05f2861cbd", - "x-mitre-tactic--ddb9dd2f-6a39-46e8-9b3c-a25c12cef614", - "x-mitre-tactic--ede1dc9b-6afa-46d1-a42c-6b3e791bc1eb", - "x-mitre-tactic--66b91148-79b6-472f-b48b-5c74113088dc", - "x-mitre-tactic--81feb109-6d02-468e-bd47-006ce9d9aafa", - "x-mitre-tactic--898251e6-a030-4ff1-8037-2c4b49e85ed3", - "x-mitre-tactic--6a8a5578-8e24-4599-b5ce-556f207927c7" - ], - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation", - "external_id": "DISARM" - } - ] - } - ] -} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--10b904db-7568-4a50-bf6f-9541f3b01924.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--10b904db-7568-4a50-bf6f-9541f3b01924.json new file mode 100644 index 0000000..f520de7 --- /dev/null +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--10b904db-7568-4a50-bf6f-9541f3b01924.json @@ -0,0 +1,27 @@ +{ + "type": "bundle", + "id": "bundle--4461f01a-da79-454c-9217-16ee4191acfa", + "objects": [ + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--10b904db-7568-4a50-bf6f-9541f3b01924", + "created_by_ref": "identity--2a9898a9-5d27-4f77-90d6-81cb400c7dc0", + "created": "2022-07-01T03:29:17.096002Z", + "modified": "2022-07-01T03:29:17.096002Z", + "name": "Target Audience Analysis", + "description": "Identifying and analyzing the target audience examines target audience member locations, political affiliations, financial situations, and other attributes that an influence operation may incorporate into its messaging strategy. During this tactic, influence operations may also identify existing similarities and differences between target audience members to unite like groups and divide opposing groups. Identifying and analyzing target audience members allows influence operations to tailor operation strategy and content to their analysis. ", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA13.md", + "external_id": "TA13" + } + ], + "object_marking_refs": [ + "marking-definition--32769669-4b13-4c4b-89c6-e877a011fa61" + ], + "x_mitre_shortname": "target-audience-analysis" + } + ] +} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--2f02c1ff-9e62-469c-a8bf-d9a6b1cc7917.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--2f02c1ff-9e62-469c-a8bf-d9a6b1cc7917.json deleted file mode 100644 index 259175c..0000000 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--2f02c1ff-9e62-469c-a8bf-d9a6b1cc7917.json +++ /dev/null @@ -1,27 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--f2dbe925-7980-4ad5-b1ce-56ff638f6894", - "objects": [ - { - "type": "x-mitre-tactic", - "spec_version": "2.1", - "id": "x-mitre-tactic--2f02c1ff-9e62-469c-a8bf-d9a6b1cc7917", - "created_by_ref": "identity--1bb5fb95-92d8-4177-bd6f-69d39102c166", - "created": "2022-06-29T15:07:39.59933Z", - "modified": "2022-06-29T15:07:39.59933Z", - "name": "Objective Planning", - "description": "Set clearly defined, measurable, and achievable objectives. Achieving objectives ties execution of tactical tasks to reaching the desired end state. There are four primary considerations:\n- Each desired effect should link directly to one or more objectives\n- The effect should be measurable\n- The objective statement should not specify the way and means of accomplishment\n- The effect should be distinguishable from the objective it supports as a condition for success, not as another objective or task.", - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA02.md", - "external_id": "TA02" - } - ], - "object_marking_refs": [ - "marking-definition--2ec6f56d-d375-41a5-8130-9b6ebf4a86dc" - ], - "x_mitre_shortname": "objective-planning" - } - ] -} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--2fad8829-108a-4d6a-8135-6bc3bf74a770.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--2fad8829-108a-4d6a-8135-6bc3bf74a770.json new file mode 100644 index 0000000..81d2abd --- /dev/null +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--2fad8829-108a-4d6a-8135-6bc3bf74a770.json @@ -0,0 +1,27 @@ +{ + "type": "bundle", + "id": "bundle--3ff8c22f-5948-40ad-91a3-f64f5a8bc218", + "objects": [ + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--2fad8829-108a-4d6a-8135-6bc3bf74a770", + "created_by_ref": "identity--62fae23f-94ca-47ca-a703-4e203716b2f5", + "created": "2022-07-01T03:29:17.098423Z", + "modified": "2022-07-01T03:29:17.098423Z", + "name": "Drive Online Harms", + "description": "Actions taken by an influence operation to harm their opponents in online spaces through harassment, suppression, releasing private information, and controlling the information space through offensive cyberspace operations. ", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA18.md", + "external_id": "TA18" + } + ], + "object_marking_refs": [ + "marking-definition--885c611a-01f1-4456-9415-81dacb2de148" + ], + "x_mitre_shortname": "drive-online-harms" + } + ] +} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--5c04a4d3-dd32-458b-952e-1e05f2861cbd.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--4348a49d-d21a-4915-a512-ba1accaa8cd9.json similarity index 54% rename from generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--5c04a4d3-dd32-458b-952e-1e05f2861cbd.json rename to generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--4348a49d-d21a-4915-a512-ba1accaa8cd9.json index 4ce6957..966c4ec 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--5c04a4d3-dd32-458b-952e-1e05f2861cbd.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--4348a49d-d21a-4915-a512-ba1accaa8cd9.json @@ -1,16 +1,16 @@ { "type": "bundle", - "id": "bundle--4c4825ff-96cf-4bfb-bc6a-1406a2466484", + "id": "bundle--fb5e5abc-7c17-42f9-8867-98fdf201db2d", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "x-mitre-tactic--5c04a4d3-dd32-458b-952e-1e05f2861cbd", - "created_by_ref": "identity--d9d725ce-a097-4c35-a468-04828dfdfd3a", - "created": "2022-06-29T15:07:39.604105Z", - "modified": "2022-06-29T15:07:39.604105Z", + "id": "x-mitre-tactic--4348a49d-d21a-4915-a512-ba1accaa8cd9", + "created_by_ref": "identity--ebae25a4-b31b-40c4-b26f-c603911318b6", + "created": "2022-07-01T03:29:17.092712Z", + "modified": "2022-07-01T03:29:17.092712Z", "name": "Develop Content", - "description": "Create and acquire content used in incident", + "description": "TBD", "external_references": [ { "source_name": "DISARM", @@ -19,7 +19,7 @@ } ], "object_marking_refs": [ - "marking-definition--6c534bfb-7b1b-4af3-be06-6855f71c8d0a" + "marking-definition--f6a72729-0ae7-401c-b0c0-8f97fa40e86e" ], "x_mitre_shortname": "develop-content" } diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--49b9b288-58bb-41b8-b2b7-570e10025264.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--49b9b288-58bb-41b8-b2b7-570e10025264.json deleted file mode 100644 index 4ed9920..0000000 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--49b9b288-58bb-41b8-b2b7-570e10025264.json +++ /dev/null @@ -1,27 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--9928ec7f-24b8-4785-93fe-4ee96a7f0d3f", - "objects": [ - { - "type": "x-mitre-tactic", - "spec_version": "2.1", - "id": "x-mitre-tactic--49b9b288-58bb-41b8-b2b7-570e10025264", - "created_by_ref": "identity--0b41447d-bea6-40d3-9ac8-8a04b664b04c", - "created": "2022-06-29T15:07:39.600239Z", - "modified": "2022-06-29T15:07:39.600239Z", - "name": "Conduct Center of Gravity Analysis", - "description": "Recon/research to identify \"the source of power that provides moral or physical strength, freedom of action, or will to act.\" Thus, the center of gravity is usually seen as the \"source of strength\". Includes demographic and network analysis of communities", - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA13.md", - "external_id": "TA13" - } - ], - "object_marking_refs": [ - "marking-definition--f4e8ae1c-deab-4507-80fd-fecc81a150cc" - ], - "x_mitre_shortname": "conduct-center-of-gravity-analysis" - } - ] -} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--5d068e30-413a-4465-b51b-8e9fc1e18b1e.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--5d068e30-413a-4465-b51b-8e9fc1e18b1e.json new file mode 100644 index 0000000..6c0c3a1 --- /dev/null +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--5d068e30-413a-4465-b51b-8e9fc1e18b1e.json @@ -0,0 +1,27 @@ +{ + "type": "bundle", + "id": "bundle--07b90a55-63c1-467c-b3c7-006ab91d7bf1", + "objects": [ + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--5d068e30-413a-4465-b51b-8e9fc1e18b1e", + "created_by_ref": "identity--e6b10b3f-81f4-4f5d-a61b-6ba6d32a927c", + "created": "2022-07-01T03:29:17.096916Z", + "modified": "2022-07-01T03:29:17.096916Z", + "name": "Establish Social Assets", + "description": "Establishing information assets generates messaging tools, including social media accounts, operation personnel, and organizations, including directly and indirectly managed assets. For assets under their direct control, the operation can add, change, or remove these assets at will. \nEstablishing information assets allows an influence operation to promote messaging directly to the target audience without navigating through external entities. Many online influence operations create or compromise social media accounts as a primary vector of information dissemination.", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA15.md", + "external_id": "TA15" + } + ], + "object_marking_refs": [ + "marking-definition--67f09a98-95d6-47d0-87b8-7499972e7685" + ], + "x_mitre_shortname": "establish-social-assets" + } + ] +} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--60087ffe-9390-4baf-8e93-20b3f075da8e.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--60087ffe-9390-4baf-8e93-20b3f075da8e.json new file mode 100644 index 0000000..380cbb6 --- /dev/null +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--60087ffe-9390-4baf-8e93-20b3f075da8e.json @@ -0,0 +1,27 @@ +{ + "type": "bundle", + "id": "bundle--7cc63a92-8047-4540-ac2b-24df005e1a62", + "objects": [ + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--60087ffe-9390-4baf-8e93-20b3f075da8e", + "created_by_ref": "identity--3c5779ae-e3d8-4248-abd3-fd7bf16fe311", + "created": "2022-07-01T03:29:17.097362Z", + "modified": "2022-07-01T03:29:17.097362Z", + "name": "Establish Legitimacy", + "description": "TBD", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA16.md", + "external_id": "TA16" + } + ], + "object_marking_refs": [ + "marking-definition--8309d1c8-87a1-4323-967b-7216161d998d" + ], + "x_mitre_shortname": "establish-legitimacy" + } + ] +} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--6a8a5578-8e24-4599-b5ce-556f207927c7.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--6a8a5578-8e24-4599-b5ce-556f207927c7.json deleted file mode 100644 index 3e70821..0000000 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--6a8a5578-8e24-4599-b5ce-556f207927c7.json +++ /dev/null @@ -1,27 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--cfce2706-904d-4504-b226-4a68ce26f9ca", - "objects": [ - { - "type": "x-mitre-tactic", - "spec_version": "2.1", - "id": "x-mitre-tactic--6a8a5578-8e24-4599-b5ce-556f207927c7", - "created_by_ref": "identity--a8fe2534-40b8-415a-b4fb-b11fdda48cc9", - "created": "2022-06-29T15:07:39.60928Z", - "modified": "2022-06-29T15:07:39.60928Z", - "name": "Measure Effectiveness", - "description": "Measure effectiveness of incident, for use in planning future events", - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA12.md", - "external_id": "TA12" - } - ], - "object_marking_refs": [ - "marking-definition--dc36d4e3-df17-435b-a9eb-edaabf732e61" - ], - "x_mitre_shortname": "measure-effectiveness" - } - ] -} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--66b91148-79b6-472f-b48b-5c74113088dc.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--717ccb01-df67-48a8-b6ec-9551272a4ff4.json similarity index 51% rename from generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--66b91148-79b6-472f-b48b-5c74113088dc.json rename to generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--717ccb01-df67-48a8-b6ec-9551272a4ff4.json index c78585e..6c48ca0 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--66b91148-79b6-472f-b48b-5c74113088dc.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--717ccb01-df67-48a8-b6ec-9551272a4ff4.json @@ -1,16 +1,16 @@ { "type": "bundle", - "id": "bundle--4f20176f-c1a3-43ab-9240-c8b2bb442e30", + "id": "bundle--8b22b19f-7c3f-425e-80a8-6f7e9b70a944", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "x-mitre-tactic--66b91148-79b6-472f-b48b-5c74113088dc", - "created_by_ref": "identity--fa3bc483-b617-451e-9d4b-0319b384e007", - "created": "2022-06-29T15:07:39.606564Z", - "modified": "2022-06-29T15:07:39.606564Z", - "name": "Exposure", - "description": "Release content to general public or push to larger population", + "id": "x-mitre-tactic--717ccb01-df67-48a8-b6ec-9551272a4ff4", + "created_by_ref": "identity--89b633d0-6026-4f5a-b937-96c110081e4b", + "created": "2022-07-01T03:29:17.094056Z", + "modified": "2022-07-01T03:29:17.094056Z", + "name": "Deliver Content", + "description": "Release content to general public or larger population", "external_references": [ { "source_name": "DISARM", @@ -19,9 +19,9 @@ } ], "object_marking_refs": [ - "marking-definition--18be7d67-99d2-445e-82e4-cb2a2d2001c5" + "marking-definition--7b7d7a4a-d135-432c-b8e8-d758ec6aaabe" ], - "x_mitre_shortname": "exposure" + "x_mitre_shortname": "deliver-content" } ] } diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--7c9b3fa5-50f8-4fab-acc3-f984b7290cd7.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--7c9b3fa5-50f8-4fab-acc3-f984b7290cd7.json new file mode 100644 index 0000000..3700963 --- /dev/null +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--7c9b3fa5-50f8-4fab-acc3-f984b7290cd7.json @@ -0,0 +1,27 @@ +{ + "type": "bundle", + "id": "bundle--137c0829-3763-4e32-b13c-a5d10696a1d4", + "objects": [ + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--7c9b3fa5-50f8-4fab-acc3-f984b7290cd7", + "created_by_ref": "identity--68919beb-b367-4f0d-b473-7c1ef2f7cc41", + "created": "2022-07-01T03:29:17.093161Z", + "modified": "2022-07-01T03:29:17.093161Z", + "name": "Select Channels and Affordances", + "description": "Selecting platforms and affordances assesses which online or offline platforms and their associated affordances maximize an influence operation\u2019s ability to reach its target audience. To select the most appropriate platform(s), an operation may assess the technological affordances including platform algorithms, terms of service, permitted content types, or other attributes that determine platform usability and accessibility. Selecting platforms includes both choosing platforms on which the operation will publish its own content and platforms on which the operation will attempt to restrict adversarial content.", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA07.md", + "external_id": "TA07" + } + ], + "object_marking_refs": [ + "marking-definition--a3ba48a6-8927-4416-8923-070e7b66d99b" + ], + "x_mitre_shortname": "select-channels-and-affordances" + } + ] +} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--81feb109-6d02-468e-bd47-006ce9d9aafa.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--81feb109-6d02-468e-bd47-006ce9d9aafa.json deleted file mode 100644 index c159323..0000000 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--81feb109-6d02-468e-bd47-006ce9d9aafa.json +++ /dev/null @@ -1,27 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--6ca7f66f-f3b2-47e7-9266-78e6ffa2b975", - "objects": [ - { - "type": "x-mitre-tactic", - "spec_version": "2.1", - "id": "x-mitre-tactic--81feb109-6d02-468e-bd47-006ce9d9aafa", - "created_by_ref": "identity--38b488f5-bebd-4549-b299-b48a025ab7a7", - "created": "2022-06-29T15:07:39.607327Z", - "modified": "2022-06-29T15:07:39.607327Z", - "name": "Drive Offline Activity", - "description": "Move incident into offline world", - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA10.md", - "external_id": "TA10" - } - ], - "object_marking_refs": [ - "marking-definition--c71c8982-494c-4f13-b20c-5ed4357852f0" - ], - "x_mitre_shortname": "drive-offline-activity" - } - ] -} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--898251e6-a030-4ff1-8037-2c4b49e85ed3.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--898251e6-a030-4ff1-8037-2c4b49e85ed3.json deleted file mode 100644 index b0757ca..0000000 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--898251e6-a030-4ff1-8037-2c4b49e85ed3.json +++ /dev/null @@ -1,27 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--acd0ee27-b4a9-4ea2-9e79-fcdc20e08f2f", - "objects": [ - { - "type": "x-mitre-tactic", - "spec_version": "2.1", - "id": "x-mitre-tactic--898251e6-a030-4ff1-8037-2c4b49e85ed3", - "created_by_ref": "identity--4372f1ab-ec3d-4c3c-9c9f-2388733f6690", - "created": "2022-06-29T15:07:39.60849Z", - "modified": "2022-06-29T15:07:39.60849Z", - "name": "Persistence", - "description": "Keep incident 'alive', beyond the incident creators' efforts", - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA11.md", - "external_id": "TA11" - } - ], - "object_marking_refs": [ - "marking-definition--674862c3-7265-4282-bd8c-3a0d22c4c4c0" - ], - "x_mitre_shortname": "persistence" - } - ] -} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--96ec7676-22a8-40f8-91f9-2b770fec3a78.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--96ec7676-22a8-40f8-91f9-2b770fec3a78.json new file mode 100644 index 0000000..226f046 --- /dev/null +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--96ec7676-22a8-40f8-91f9-2b770fec3a78.json @@ -0,0 +1,27 @@ +{ + "type": "bundle", + "id": "bundle--4d550830-fee7-44d4-ad8b-813010f99d87", + "objects": [ + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--96ec7676-22a8-40f8-91f9-2b770fec3a78", + "created_by_ref": "identity--2390bb84-1e20-4e06-beb8-f61631529f6f", + "created": "2022-07-01T03:29:17.095552Z", + "modified": "2022-07-01T03:29:17.095552Z", + "name": "Assess Effectiveness", + "description": "Assess effectiveness of action, for use in future plans ", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA12.md", + "external_id": "TA12" + } + ], + "object_marking_refs": [ + "marking-definition--8b21940e-5b88-4d9f-9708-d69f7b827cf4" + ], + "x_mitre_shortname": "assess-effectiveness" + } + ] +} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--977b0d14-c42a-4f3e-badb-fdabb9781544.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--977b0d14-c42a-4f3e-badb-fdabb9781544.json new file mode 100644 index 0000000..5477fbc --- /dev/null +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--977b0d14-c42a-4f3e-badb-fdabb9781544.json @@ -0,0 +1,27 @@ +{ + "type": "bundle", + "id": "bundle--230dce31-189c-4d61-bf95-cb19c2f494f7", + "objects": [ + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--977b0d14-c42a-4f3e-badb-fdabb9781544", + "created_by_ref": "identity--4fdd4e7b-3b3e-425e-847f-dc5f200fb7cf", + "created": "2022-07-01T03:29:17.096467Z", + "modified": "2022-07-01T03:29:17.096467Z", + "name": "Develop Narratives", + "description": "The promotion of beneficial master narratives is perhaps the most effective method for achieving long-term strategic narrative dominance. From a \"\"whole of society\"\" perspective the promotion of the society's core master narratives should occupy a central strategic role. From a misinformation campaign / cognitive security perpectve the tactics around master narratives center more precisely on the day-to-day promotion and reinforcement of this messaging. In other words, beneficial, high-coverage master narratives are a central strategic goal and their promotion constitutes an ongoing tactical struggle carried out at a whole-of-society level. Tactically, their promotion covers a broad spectrum of activities both on- and offline.", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA14.md", + "external_id": "TA14" + } + ], + "object_marking_refs": [ + "marking-definition--369927eb-a5a4-4672-a0d0-88d758feed9d" + ], + "x_mitre_shortname": "develop-narratives" + } + ] +} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--a9cc9713-f33b-44a8-868b-c59950406f76.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--a9cc9713-f33b-44a8-868b-c59950406f76.json deleted file mode 100644 index 42289df..0000000 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--a9cc9713-f33b-44a8-868b-c59950406f76.json +++ /dev/null @@ -1,27 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--42d7c820-99f3-44e7-a0d9-04069bf9b124", - "objects": [ - { - "type": "x-mitre-tactic", - "spec_version": "2.1", - "id": "x-mitre-tactic--a9cc9713-f33b-44a8-868b-c59950406f76", - "created_by_ref": "identity--6dae4715-664b-454e-82fb-96d8bfcc300e", - "created": "2022-06-29T15:07:39.602545Z", - "modified": "2022-06-29T15:07:39.602545Z", - "name": "Develop Networks", - "description": "Develop online and offline communities and transmission methods and cultivate assets and unwitting agents", - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA04.md", - "external_id": "TA04" - } - ], - "object_marking_refs": [ - "marking-definition--61f73ca8-1f50-4cd2-8950-14b91614578a" - ], - "x_mitre_shortname": "develop-networks" - } - ] -} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--b2ad03fa-b162-4161-b864-344f9cb69ad3.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--b2ad03fa-b162-4161-b864-344f9cb69ad3.json new file mode 100644 index 0000000..e3ff0f1 --- /dev/null +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--b2ad03fa-b162-4161-b864-344f9cb69ad3.json @@ -0,0 +1,27 @@ +{ + "type": "bundle", + "id": "bundle--b8dfd54d-4920-49c4-85a6-a36017c49e0d", + "objects": [ + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--b2ad03fa-b162-4161-b864-344f9cb69ad3", + "created_by_ref": "identity--ef082dc6-c5d4-4f34-839a-afb81676681d", + "created": "2022-07-01T03:29:17.094502Z", + "modified": "2022-07-01T03:29:17.094502Z", + "name": "Drive Offline Activity", + "description": "Move incident/campaign from online to offline. Encouraging users to move from the platform on which they initially viewed operation content and engage in the physical information space or offline world. This may include operation-aligned rallies or protests, radio, newspaper, or billboards. An influence operation may drive to physical forums to diversify its information channels and facilitate spaces where the target audience can engage with both operation content and like-minded individuals offline. ", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA10.md", + "external_id": "TA10" + } + ], + "object_marking_refs": [ + "marking-definition--6c20ec26-a68f-4ea4-87e7-0f4c3d1dc466" + ], + "x_mitre_shortname": "drive-offline-activity" + } + ] +} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--c4e65fa5-4f02-4075-b26f-07c0d07badaa.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--c4e65fa5-4f02-4075-b26f-07c0d07badaa.json new file mode 100644 index 0000000..9da7e46 --- /dev/null +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--c4e65fa5-4f02-4075-b26f-07c0d07badaa.json @@ -0,0 +1,27 @@ +{ + "type": "bundle", + "id": "bundle--48aca227-7232-4046-b5f4-c71bdccb3509", + "objects": [ + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--c4e65fa5-4f02-4075-b26f-07c0d07badaa", + "created_by_ref": "identity--9ce26eb7-7607-4333-b84b-6b0e2cd074a3", + "created": "2022-07-01T03:29:17.097809Z", + "modified": "2022-07-01T03:29:17.097809Z", + "name": "Maximize Exposure", + "description": "Maximize exposure of the target audience to incident/campaign content via flooding, amplifying, and cross-posting.", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA17.md", + "external_id": "TA17" + } + ], + "object_marking_refs": [ + "marking-definition--75ce5799-1b91-4be6-8427-d41dc3c3b8b2" + ], + "x_mitre_shortname": "maximize-exposure" + } + ] +} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--45968fd4-4fdb-4ba2-82e1-f5e5c148e325.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--ca848c76-3e2e-4059-a61f-dce4180b4710.json similarity index 55% rename from generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--45968fd4-4fdb-4ba2-82e1-f5e5c148e325.json rename to generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--ca848c76-3e2e-4059-a61f-dce4180b4710.json index dcec675..a8b3d34 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--45968fd4-4fdb-4ba2-82e1-f5e5c148e325.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--ca848c76-3e2e-4059-a61f-dce4180b4710.json @@ -1,15 +1,15 @@ { "type": "bundle", - "id": "bundle--a297d796-046f-4479-822b-ae6c90aa93f4", + "id": "bundle--78ff933c-c4b7-4268-a1a9-07ff5fe413b9", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "x-mitre-tactic--45968fd4-4fdb-4ba2-82e1-f5e5c148e325", - "created_by_ref": "identity--125833cb-53bf-4bae-b876-1f1380db32f9", - "created": "2022-06-29T15:07:39.598443Z", - "modified": "2022-06-29T15:07:39.598443Z", - "name": "Strategic Planning", + "id": "x-mitre-tactic--ca848c76-3e2e-4059-a61f-dce4180b4710", + "created_by_ref": "identity--579368bd-8440-4f8e-96c2-ad508b73a5e9", + "created": "2022-07-01T03:29:17.091145Z", + "modified": "2022-07-01T03:29:17.091145Z", + "name": "Plan Strategy", "description": "Define the desired end state, i.e. the set of required conditions that defines achievement of all objectives.", "external_references": [ { @@ -19,9 +19,9 @@ } ], "object_marking_refs": [ - "marking-definition--57742fd1-338e-4321-9899-e3d5dca7b965" + "marking-definition--d12db0e6-fa29-41c5-b43e-a46d0618d61c" ], - "x_mitre_shortname": "strategic-planning" + "x_mitre_shortname": "plan-strategy" } ] } diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--ddb9dd2f-6a39-46e8-9b3c-a25c12cef614.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--ddb9dd2f-6a39-46e8-9b3c-a25c12cef614.json deleted file mode 100644 index 6ae8d5d..0000000 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--ddb9dd2f-6a39-46e8-9b3c-a25c12cef614.json +++ /dev/null @@ -1,27 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--5056ad9a-431c-4727-a68d-fad98be22a7d", - "objects": [ - { - "type": "x-mitre-tactic", - "spec_version": "2.1", - "id": "x-mitre-tactic--ddb9dd2f-6a39-46e8-9b3c-a25c12cef614", - "created_by_ref": "identity--afcafb94-dc2c-45da-b40a-6afdbf8e536f", - "created": "2022-06-29T15:07:39.604873Z", - "modified": "2022-06-29T15:07:39.604873Z", - "name": "Channel Selection", - "description": "Set up specific delivery, amplification and manipulation channels for incident, including channels to attack. Each channel serves as an atomic surface (test bed) location/site for adversary to hide/conceal the work/content that goes into setting up for this channel and/or other specific platforms. Contributes to building out a connected ecosystem where this channel can operate as part of a whole campaign/incident", - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA07.md", - "external_id": "TA07" - } - ], - "object_marking_refs": [ - "marking-definition--19f570c1-18da-4e67-a25d-2dfebe78f672" - ], - "x_mitre_shortname": "channel-selection" - } - ] -} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--6c6c13f5-aa72-42e5-a9d2-4700306c353e.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--e749a24c-8362-4fed-ba26-51e56b37b439.json similarity index 53% rename from generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--6c6c13f5-aa72-42e5-a9d2-4700306c353e.json rename to generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--e749a24c-8362-4fed-ba26-51e56b37b439.json index a39a034..b0dbc6b 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--6c6c13f5-aa72-42e5-a9d2-4700306c353e.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--e749a24c-8362-4fed-ba26-51e56b37b439.json @@ -1,15 +1,15 @@ { "type": "bundle", - "id": "bundle--469a137e-39fc-4566-b53a-1ee8293bf73c", + "id": "bundle--e6e649a9-c13a-42c5-92a0-d5debecf8761", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "x-mitre-tactic--6c6c13f5-aa72-42e5-a9d2-4700306c353e", - "created_by_ref": "identity--5ed012d0-1601-486c-8d8d-7ed4484b5b3f", - "created": "2022-06-29T15:07:39.60333Z", - "modified": "2022-06-29T15:07:39.60333Z", - "name": "Microtargeting", + "id": "x-mitre-tactic--e749a24c-8362-4fed-ba26-51e56b37b439", + "created_by_ref": "identity--a8a35a10-0c6d-48ab-9642-0d968a0e6579", + "created": "2022-07-01T03:29:17.092239Z", + "modified": "2022-07-01T03:29:17.092239Z", + "name": "Microtarget", "description": "Target very specific populations of people", "external_references": [ { @@ -19,9 +19,9 @@ } ], "object_marking_refs": [ - "marking-definition--4bce6287-e6b3-4eb3-9f72-c517e91fa686" + "marking-definition--9e9c4039-2734-451e-9eae-14bfee5150c5" ], - "x_mitre_shortname": "microtargeting" + "x_mitre_shortname": "microtarget" } ] } diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--eec7c49a-35c0-4ed2-9161-f7dba316a609.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--eec7c49a-35c0-4ed2-9161-f7dba316a609.json new file mode 100644 index 0000000..3107cad --- /dev/null +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--eec7c49a-35c0-4ed2-9161-f7dba316a609.json @@ -0,0 +1,27 @@ +{ + "type": "bundle", + "id": "bundle--da6e9a80-5219-454d-ba65-09dd259101cb", + "objects": [ + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--eec7c49a-35c0-4ed2-9161-f7dba316a609", + "created_by_ref": "identity--7b955472-f8e6-4b82-8c31-300defa2ff1d", + "created": "2022-07-01T03:29:17.091699Z", + "modified": "2022-07-01T03:29:17.091699Z", + "name": "Plan Objectives", + "description": "Set clearly defined, measurable, and achievable objectives. Achieving objectives ties execution of tactical tasks to reaching the desired end state. There are four primary considerations: \n- Each desired effect should link directly to one or more objectives \n- The effect should be measurable \n- The objective statement should not specify the way and means of accomplishment \n- The effect should be distinguishable from the objective it supports as a condition for success, not as another objective or task.", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA02.md", + "external_id": "TA02" + } + ], + "object_marking_refs": [ + "marking-definition--efbc7fb0-9eca-4e7c-b2e7-c22aea404a22" + ], + "x_mitre_shortname": "plan-objectives" + } + ] +} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--efddae0c-df65-48be-a7a4-067237d8a528.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--efddae0c-df65-48be-a7a4-067237d8a528.json new file mode 100644 index 0000000..708b3db --- /dev/null +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--efddae0c-df65-48be-a7a4-067237d8a528.json @@ -0,0 +1,27 @@ +{ + "type": "bundle", + "id": "bundle--fd967e77-4f0a-474e-9c94-948a914a0ab1", + "objects": [ + { + "type": "x-mitre-tactic", + "spec_version": "2.1", + "id": "x-mitre-tactic--efddae0c-df65-48be-a7a4-067237d8a528", + "created_by_ref": "identity--2d057bc4-00f4-42ed-b56d-f441f58c0224", + "created": "2022-07-01T03:29:17.0951Z", + "modified": "2022-07-01T03:29:17.0951Z", + "name": "Persist in the Information Environment", + "description": "Persist in the Information Space refers to taking measures that allow an operation to maintain its presence and avoid takedown by an external entity. Techniques in Persist in the Information Space help campaigns operate without detection and appear legitimate to the target audience and platform monitoring services. Influence operations on social media often persist online by varying the type of information assets and platforms used throughout the campaign.", + "external_references": [ + { + "source_name": "DISARM", + "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA11.md", + "external_id": "TA11" + } + ], + "object_marking_refs": [ + "marking-definition--7e8d9bd0-001f-45d2-aa7f-a57b18f3df70" + ], + "x_mitre_shortname": "persist-in-the-information-environment" + } + ] +} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--f2d0efbf-0f86-419b-917b-2f3dc904094d.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--f2d0efbf-0f86-419b-917b-2f3dc904094d.json deleted file mode 100644 index ef39edf..0000000 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--f2d0efbf-0f86-419b-917b-2f3dc904094d.json +++ /dev/null @@ -1,27 +0,0 @@ -{ - "type": "bundle", - "id": "bundle--c9d2cfe2-f755-492d-a42b-bf8837164208", - "objects": [ - { - "type": "x-mitre-tactic", - "spec_version": "2.1", - "id": "x-mitre-tactic--f2d0efbf-0f86-419b-917b-2f3dc904094d", - "created_by_ref": "identity--6099b19d-e04a-4c37-bda2-98d74fb89c39", - "created": "2022-06-29T15:07:39.601668Z", - "modified": "2022-06-29T15:07:39.601668Z", - "name": "Develop People", - "description": "Develop online and offline users and agents, including automated personas", - "external_references": [ - { - "source_name": "DISARM", - "url": "https://github.com/DISARMFoundation/DISARM_framework/blob/master/tactics/TA03.md", - "external_id": "TA03" - } - ], - "object_marking_refs": [ - "marking-definition--1114b012-3734-403b-b0b5-cd9b05671a62" - ], - "x_mitre_shortname": "develop-people" - } - ] -} diff --git a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--ede1dc9b-6afa-46d1-a42c-6b3e791bc1eb.json b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--f59414c8-2d4d-4d9e-8d88-fe8a339270d1.json similarity index 54% rename from generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--ede1dc9b-6afa-46d1-a42c-6b3e791bc1eb.json rename to generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--f59414c8-2d4d-4d9e-8d88-fe8a339270d1.json index 0674d96..37a0ae1 100644 --- a/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--ede1dc9b-6afa-46d1-a42c-6b3e791bc1eb.json +++ b/generated_files/DISARM_STIX/x-mitre-tactic/x-mitre-tactic--f59414c8-2d4d-4d9e-8d88-fe8a339270d1.json @@ -1,16 +1,16 @@ { "type": "bundle", - "id": "bundle--a4d979f5-21b3-49bc-a6c4-7e9cb5d38c90", + "id": "bundle--71c743c3-aa29-49fe-b7ee-793ac86267ad", "objects": [ { "type": "x-mitre-tactic", "spec_version": "2.1", - "id": "x-mitre-tactic--ede1dc9b-6afa-46d1-a42c-6b3e791bc1eb", - "created_by_ref": "identity--5db0a7c4-6a1b-4bf4-96fe-903e83aeffa8", - "created": "2022-06-29T15:07:39.60579Z", - "modified": "2022-06-29T15:07:39.60579Z", - "name": "Pump Priming", - "description": "Release content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing. ", + "id": "x-mitre-tactic--f59414c8-2d4d-4d9e-8d88-fe8a339270d1", + "created_by_ref": "identity--957e8ee3-66c0-4c39-81ab-bc8f197dc060", + "created": "2022-07-01T03:29:17.093615Z", + "modified": "2022-07-01T03:29:17.093615Z", + "name": "Conduct Pump Priming", + "description": "Release content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing. ", "external_references": [ { "source_name": "DISARM", @@ -19,9 +19,9 @@ } ], "object_marking_refs": [ - "marking-definition--d2c8701a-10d8-44ed-813f-816287d4338e" + "marking-definition--8f98688d-973b-4d80-a055-eef509cafa92" ], - "x_mitre_shortname": "pump-priming" + "x_mitre_shortname": "conduct-pump-priming" } ] } diff --git a/generated_files/blue_framework_ids.csv b/generated_files/blue_framework_ids.csv index d926ce5..bb32ace 100644 --- a/generated_files/blue_framework_ids.csv +++ b/generated_files/blue_framework_ids.csv @@ -1,30 +1,30 @@ -P01,P01,P01,P02,P02,P02,P02,P02,P02,P03,P03,P03,P03,P03,P03,P04 -TA01,TA02,TA03,TA04,TA05,TA06,TA07,TA08,TA09,TA10,TA11,TA12,TA13,TA14,TA15,TA16 -C00006,C00009,C00034,C00047,C00065,C00014,C00090,C00100,C00109,,C00131,C00140,,,, -C00008,C00011,C00036,C00052,C00066,C00032,C00097,C00112,C00122,,C00138,C00148,,,, -C00010,C00028,C00040,C00053,C00130,C00071,C00098,C00113,C00123,,C00139,C00149,,,, -C00012,C00029,C00042,C00056,C00178,C00072,C00099,C00114,C00124,,C00143,,,,, -C00013,C00030,C00044,C00059,C00216,C00074,C00101,C00115,C00125,,,,,,, -C00016,C00031,C00046,C00062,,C00075,C00103,C00116,C00126,,,,,,, -C00017,C00060,C00048,C00135,,C00076,C00105,C00117,C00128,,,,,,, -C00019,C00070,C00051,C00162,,C00078,C00195,C00118,C00129,,,,,,, -C00021,C00092,C00058,C00172,,C00080,,C00119,C00147,,,,,,, -C00022,C00144,C00067,C00203,,C00081,,C00120,C00182,,,,,,, -C00024,C00156,C00077,,,C00082,,C00121,C00200,,,,,,, -C00026,C00164,C00093,,,C00084,,C00136,C00211,,,,,,, -C00027,C00169,C00133,,,C00085,,C00154,,,,,,,, -C00073,C00207,C00155,,,C00086,,C00184,,,,,,,, -C00096,C00222,C00160,,,C00087,,C00188,,,,,,,, -C00111,,C00189,,,C00091,,,,,,,,,, -C00153,,C00197,,,C00094,,,,,,,,,, -C00159,,,,,C00106,,,,,,,,,, -C00161,,,,,C00107,,,,,,,,,, -C00170,,,,,C00142,,,,,,,,,, -C00174,,,,,C00165,,,,,,,,,, -C00176,,,,,C00202,,,,,,,,,, -C00190,,,,,C00219,,,,,,,,,, -C00205,,,,,,,,,,,,,,, -C00212,,,,,,,,,,,,,,, -C00220,,,,,,,,,,,,,,, -C00221,,,,,,,,,,,,,,, +P01,P01,P02,P02,P02,P03,P03,P03,P03,P04,P01,P02,P02,P02,P03,P03 +TA01,TA02,TA05,TA06,TA07,TA08,TA09,TA10,TA11,TA12,TA13,TA14,TA15,TA16,TA17,TA18 +C00006,C00009,C00065,C00014,C00090,C00100,C00109,,C00131,C00140,,,C00034,,, +C00008,C00011,C00066,C00032,C00097,C00112,C00122,,C00138,C00148,,,C00036,,, +C00010,C00028,C00130,C00071,C00098,C00113,C00123,,C00139,C00149,,,C00040,,, +C00012,C00029,C00178,C00072,C00099,C00114,C00124,,C00143,,,,C00042,,, +C00013,C00030,C00216,C00074,C00101,C00115,C00125,,,,,,C00044,,, +C00016,C00031,,C00075,C00103,C00116,C00126,,,,,,C00046,,, +C00017,C00060,,C00076,C00105,C00117,C00128,,,,,,C00047,,, +C00019,C00070,,C00078,C00195,C00118,C00129,,,,,,C00048,,, +C00021,C00092,,C00080,,C00119,C00147,,,,,,C00051,,, +C00022,C00144,,C00081,,C00120,C00182,,,,,,C00052,,, +C00024,C00156,,C00082,,C00121,C00200,,,,,,C00053,,, +C00026,C00164,,C00084,,C00136,C00211,,,,,,C00056,,, +C00027,C00169,,C00085,,C00154,,,,,,,C00058,,, +C00073,C00207,,C00086,,C00184,,,,,,,C00059,,, +C00096,C00222,,C00087,,C00188,,,,,,,C00062,,, +C00111,,,C00091,,,,,,,,,C00067,,, +C00153,,,C00094,,,,,,,,,C00077,,, +C00159,,,C00106,,,,,,,,,C00093,,, +C00161,,,C00107,,,,,,,,,C00133,,, +C00170,,,C00142,,,,,,,,,C00135,,, +C00174,,,C00165,,,,,,,,,C00155,,, +C00176,,,C00202,,,,,,,,,C00160,,, +C00190,,,C00219,,,,,,,,,C00162,,, +C00205,,,,,,,,,,,,C00172,,, +C00212,,,,,,,,,,,,C00189,,, +C00220,,,,,,,,,,,,C00197,,, +C00221,,,,,,,,,,,,C00203,,, C00223,,,,,,,,,,,,,,, diff --git a/generated_files/disarm_blue_framework_clickable.html b/generated_files/disarm_blue_framework_clickable.html index 72e7176..8a0b9c2 100644 --- a/generated_files/disarm_blue_framework_clickable.html +++ b/generated_files/disarm_blue_framework_clickable.html @@ -26,44 +26,42 @@ function handleTechniqueClick(box) { P01 Plan P01 Plan -P01 Plan P02 Prepare P02 Prepare P02 Prepare -P02 Prepare -P02 Prepare -P02 Prepare -P03 Execute -P03 Execute P03 Execute P03 Execute P03 Execute P03 Execute P04 Assess +P01 Plan +P02 Prepare +P02 Prepare +P02 Prepare +P03 Execute +P03 Execute TA01 Plan Strategy TA02 Plan Objectives -TA03 Target Audience Analysis -TA04 Develop Narratives -TA05 Develop Content -TA06 Establish Social Assets -TA07 Establish Legitimacy -TA08 Microtarget -TA09 Select Channels and Affordances -TA10 Conduct Pump Priming -TA11 Deliver Content -TA12 Maximize Exposure -TA13 Drive Online Harms -TA14 Drive Offline Activity -TA15 Persist in the Information Environment -TA16 Assess Effectiveness +TA05 Microtarget +TA06 Develop Content +TA07 Select Channels and Affordances +TA08 Conduct Pump Priming +TA09 Deliver Content +TA10 Drive Offline Activity +TA11 Persist in the Information Environment +TA12 Assess Effectiveness +TA13 Target Audience Analysis +TA14 Develop Narratives +TA15 Establish Social Assets +TA16 Establish Legitimacy +TA17 Maximize Exposure +TA18 Drive Online Harms C00006 Charge for social media C00009 Educate high profile influencers on best practices -C00034 Create more friction at account creation -C00047 Honeypot with coordinated inauthentics C00065 Reduce political targeting C00014 Real-time updates to fact-checking database C00090 Fake engagement system @@ -74,14 +72,14 @@ function handleTechniqueClick(box) { C00140 "Bomb" link shorteners with lots of calls +C00034 Create more friction at account creation + C00008 Create shared fact-checking database C00011 Media literacy. Games to identify fake news -C00036 Infiltrate the in-group to discredit leaders (divide) -C00052 Infiltrate platforms C00066 Co-opt a hashtag and drown it out (hijack it back) C00032 Hijack content and link to truth- based info C00097 Require use of verified identities to contribute to poll or comment @@ -92,14 +90,14 @@ function handleTechniqueClick(box) { C00148 Add random links to network graphs +C00036 Infiltrate the in-group to discredit leaders (divide) + C00010 Enhanced privacy regulation for social media C00028 Make information provenance available -C00040 third party verification for people -C00053 Delete old accounts / Remove unused social media accounts C00130 Mentorship: elders, youth, credit. Learn vicariously. C00071 Block source of pollution C00098 Revocation of allowlisted or "verified" status @@ -110,14 +108,14 @@ function handleTechniqueClick(box) { C00149 Poison the monitoring & evaluation data +C00040 third party verification for people + C00012 Platform regulation C00029 Create fake website to issue counter narrative and counter narrative through physical merchandise -C00042 Address truth contained in narratives -C00056 Encourage people to leave social media C00178 Fill information voids with non-disinformation content C00072 Remove non-relevant content from special interest groups - not recommended C00099 Strengthen verification methods @@ -128,14 +126,14 @@ function handleTechniqueClick(box) { +C00042 Address truth contained in narratives + C00013 Rating framework for news C00030 Develop a compelling counter narrative (truth based) -C00044 Keep people from posting to social media immediately -C00059 Verification of project before posting fund requests C00216 Use advertiser controls to stem flow of funds to bad actors C00074 Identify and delete or rate limit identical content C00101 Create friction by rate-limiting engagement @@ -146,14 +144,14 @@ function handleTechniqueClick(box) { +C00044 Keep people from posting to social media immediately + C00016 Censorship C00031 Dilute the core narrative - create multiple permutations, target / amplify -C00046 Marginalise and discredit extremist groups -C00062 Free open library sources worldwide C00075 normalise language C00103 Create a bot that engages / distract trolls @@ -164,14 +162,14 @@ function handleTechniqueClick(box) { +C00046 Marginalise and discredit extremist groups + C00017 Repair broken social connections C00060 Legal action against for-profit engagement factories -C00048 Name and Shame Influencers -C00135 Deplatform message groups and/or message boards C00076 Prohibit images in political discourse channels C00105 Buy more advertising than misinformation creators @@ -182,14 +180,14 @@ function handleTechniqueClick(box) { +C00047 Honeypot with coordinated inauthentics + C00019 Reduce effect of division-enablers C00070 Block access to disinformation resources -C00051 Counter social engineering training -C00162 Unravel/target the Potemkin villages C00078 Change Search Algorithms for Disinformation Content C00195 Redirect searches away from disinformation or extremist content @@ -200,14 +198,14 @@ function handleTechniqueClick(box) { +C00048 Name and Shame Influencers + C00021 Encourage in-person communication C00092 Establish a truth teller reputation score for influencers -C00058 Report crowdfunder as violator -C00172 social media source removal C00080 Create competing narrative @@ -218,14 +216,14 @@ function handleTechniqueClick(box) { +C00051 Counter social engineering training + C00022 Innoculate. Positive campaign to promote feeling of safety C00144 Buy out troll farm employees / offer them jobs -C00067 Denigrate the recipient/ project (of online funding) -C00203 Stop offering press credentials to propaganda outlets C00081 Highlight flooding and noise, and explain motivations @@ -236,14 +234,14 @@ function handleTechniqueClick(box) { +C00052 Infiltrate platforms + C00024 Promote healthy narratives C00156 Better tell your country or organization story -C00077 Active defence: run TA03 "develop people” - not recommended - C00082 Ground truthing as automated response to pollution @@ -254,14 +252,14 @@ function handleTechniqueClick(box) { +C00053 Delete old accounts / Remove unused social media accounts + C00026 Shore up democracy based messages C00164 compatriot policy -C00093 Influencer code of conduct - C00084 Modify disinformation narratives, and rebroadcast them @@ -272,14 +270,14 @@ function handleTechniqueClick(box) { +C00056 Encourage people to leave social media + C00027 Create culture of civility C00169 develop a creative content hub -C00133 Deplatform Account* - C00085 Mute content @@ -290,14 +288,14 @@ function handleTechniqueClick(box) { +C00058 Report crowdfunder as violator + C00073 Inoculate populations through media literacy training C00207 Run a competing disinformation campaign - not recommended -C00155 Ban incident actors from funding sites - C00086 Distract from noise with addictive content @@ -308,14 +306,14 @@ function handleTechniqueClick(box) { +C00059 Verification of project before posting fund requests + C00096 Strengthen institutions that are always truth tellers C00222 Tabletop simulations -C00160 find and train influencers - C00087 Make more noise than the disinformation @@ -326,14 +324,14 @@ function handleTechniqueClick(box) { +C00062 Free open library sources worldwide + C00111 Reduce polarisation by connecting and presenting sympathetic renditions of opposite views -C00189 Ensure that platforms are taking down flagged accounts - C00091 Honeypot social community @@ -344,14 +342,14 @@ function handleTechniqueClick(box) { +C00067 Denigrate the recipient/ project (of online funding) + C00153 Take pre-emptive action against actors' infrastructure -C00197 remove suspicious accounts - C00094 Force full disclosure on corporate sponsor of research @@ -362,6 +360,8 @@ function handleTechniqueClick(box) { +C00077 Active defence: run TA15 "develop people” - not recommended + @@ -369,8 +369,6 @@ function handleTechniqueClick(box) { C00159 Have a disinformation response plan - - C00106 Click-bait centrist content @@ -380,6 +378,8 @@ function handleTechniqueClick(box) { +C00093 Influencer code of conduct + @@ -387,8 +387,6 @@ function handleTechniqueClick(box) { C00161 Coalition Building with stakeholders and Third-Party Inducements - - C00107 Content moderation @@ -398,6 +396,8 @@ function handleTechniqueClick(box) { +C00133 Deplatform Account* + @@ -405,8 +405,6 @@ function handleTechniqueClick(box) { C00170 elevate information as a critical domain of statecraft - - C00142 Platform adds warning label and decision point when sharing content @@ -416,6 +414,8 @@ function handleTechniqueClick(box) { +C00135 Deplatform message groups and/or message boards + @@ -423,8 +423,6 @@ function handleTechniqueClick(box) { C00174 Create a healthier news environment - - C00165 Ensure integrity of official documents @@ -434,6 +432,8 @@ function handleTechniqueClick(box) { +C00155 Ban incident actors from funding sites + @@ -441,8 +441,6 @@ function handleTechniqueClick(box) { C00176 Improve Coordination amongst stakeholders: public and private - - C00202 Set data 'honeytraps' @@ -452,6 +450,8 @@ function handleTechniqueClick(box) { +C00160 find and train influencers + @@ -459,8 +459,6 @@ function handleTechniqueClick(box) { C00190 open engagement with civil society - - C00219 Add metadata to content that’s out of the control of disinformation creators @@ -470,6 +468,8 @@ function handleTechniqueClick(box) { +C00162 Unravel/target the Potemkin villages + @@ -486,7 +486,7 @@ function handleTechniqueClick(box) { - +C00172 social media source removal @@ -504,7 +504,7 @@ function handleTechniqueClick(box) { - +C00189 Ensure that platforms are taking down flagged accounts @@ -522,7 +522,7 @@ function handleTechniqueClick(box) { - +C00197 remove suspicious accounts @@ -540,7 +540,7 @@ function handleTechniqueClick(box) { - +C00203 Stop offering press credentials to propaganda outlets @@ -570,8 +570,6 @@ function handleTechniqueClick(box) { diff --git a/generated_files/disarm_red_framework_clickable.html b/generated_files/disarm_red_framework_clickable.html index 4200b28..5f6e84e 100644 --- a/generated_files/disarm_red_framework_clickable.html +++ b/generated_files/disarm_red_framework_clickable.html @@ -26,175 +26,207 @@ function handleTechniqueClick(box) { P01 Plan P01 Plan -P01 Plan P02 Prepare P02 Prepare P02 Prepare -P02 Prepare -P02 Prepare -P02 Prepare -P03 Execute -P03 Execute P03 Execute P03 Execute P03 Execute P03 Execute P04 Assess +P01 Plan +P02 Prepare +P02 Prepare +P02 Prepare +P03 Execute +P03 Execute TA01 Plan Strategy TA02 Plan Objectives -TA03 Target Audience Analysis -TA04 Develop Narratives -TA05 Develop Content -TA06 Establish Social Assets -TA07 Establish Legitimacy -TA08 Microtarget -TA09 Select Channels and Affordances -TA10 Conduct Pump Priming -TA11 Deliver Content -TA12 Maximize Exposure -TA13 Drive Online Harms -TA14 Drive Offline Activity -TA15 Persist in the Information Environment -TA16 Assess Effectiveness +TA05 Microtarget +TA06 Develop Content +TA07 Select Channels and Affordances +TA08 Conduct Pump Priming +TA09 Deliver Content +TA10 Drive Offline Activity +TA11 Persist in the Information Environment +TA12 Assess Effectiveness +TA13 Target Audience Analysis +TA14 Develop Narratives +TA15 Establish Social Assets +TA16 Establish Legitimacy +TA17 Maximize Exposure +TA18 Drive Online Harms -T0001 Determine Target Audiences -T0003 Dismiss -T0010 Map Target Audience Information Environment -T0013 Develop New Narratives -T0020 Reuse Existing Content -T0029 Create Inauthentic Accounts -T0041 Compromise legitimate accounts -T0047 Create Clickbait -T0051 Chat apps -T0063 Trial content -T0070 Deliver Ads -T0074 Flooding the Information Space -T0080 Harass -T0085 Encourage Attendance at Events -T0090 Conceal People -T0095 Measure Performance +T0073 Determine Target Audiences +T0002 Facilitate State Propaganda +T0016 Create Clickbait +T0015 Create hashtags and search artifacts +T0029 Online polls +T0020 Trial content +T0114 Deliver Ads +T0017 Conduct fundraising +T0059 Play the long game +T0132 Measure Performance +T0072 Segment Audiences +T0003 Leverage Existing Narratives +T0007 Create Inauthentic Social Media Pages and Groups +T0009 Create fake experts +T0049 Flooding the Information Space +T0047 Censor social media as a political force -T0002 Determine Strategic Ends -T0004 Distort -T0011 Identify Social and Technical Vulnerabilities -T0014 Leverage Existing Narratives -T0021 Develop Text-based Content -T0030 Recruit bad actors -T0042 Create fake experts -T0048 Purchase Targeted Advertisements -T0052 Livestream -T0064 Bait legitimate influencers -T0071 Post Content -T0075 Amplify Existing Narrative -T0081 Censor social media as a political force -T0086 Organize Events -T0091 Conceal Operational Activity -T0096 Measure Effectiveness +T0074 Determine Strategic Ends +T0066 Degrade Adversary +T0018 Purchase Targeted Advertisements +T0019 Generate information pollution +T0043 Chat apps +T0039 Bait legitimate influencers +T0115 Post Content +T0057 Organize Events +T0060 Continue to Amplify +T0133 Measure Effectiveness +T0080 Map Target Audience Information Environment +T0004 Develop Competing Narratives +T0010 Cultivate ignorant agents +T0011 Compromise legitimate accounts +T0118 Amplify Existing Narrative +T0048 Harass -T0005 Distract -T0012 Segment Audiences -T0015 Develop Competing Narratives -T0022 Develop Image-based Content -T0031 Cultivate ignorant agents -T0043 Create personas -T0049 Create Localized Content -T0053 Social Networks -T0065 Seed Kernel of truth -T0072 Comment or Reply on Content -T0076 Cross-Posting -T0082 Control Information Environment through Offensive Cyberspace Operations -T0087 Conduct fundraising -T0092 Conceal Infrastructure -T0097 Measure Effectiveness Indicators (or KPIs) +T0075 Dismiss +T0101 Create Localized Content +T0023 Distort facts +T0103 Livestream +T0042 Seed Kernel of truth +T0116 Comment or Reply on Content +T0061 Sell Merchandise +T0128 Conceal People +T0134 Measure Effectiveness Indicators (or KPIs) +T0081 Identify Social and Technical Vulnerabilities +T0022 Leverage Conspiracy Theory Narratives +T0013 Create inauthentic websites +T0097 Create personas +T0119 Cross-Posting +T0123 Control Information Environment through Offensive Cyberspace Operations -T0006 Dismay +T0076 Distort +T0102 Leverage Echo Chambers/Filter Bubbles +T0084 Reuse Existing Content +T0104 Social Networks +T0044 Seed distortions +T0117 Attract Traditional Media +T0126 Encourage Attendance at Events +T0129 Conceal Operational Activity -T0016 Leverage Conspiracy Theory Narratives -T0023 Develop Video-based Content -T0032 Build Network -T0044 Establish Inauthentic News Sites -T0050 Leverage Echo Chambers/Filter Bubbles -T0054 Media Sharing Networks -T0066 Seed distortions -T0073 Attract Traditional Media -T0077 Incentivize Sharing -T0083 Suppress Opposition -T0088 Physical Violence -T0093 Exploit TOS/Content Moderation + +T0040 Demand insurmountable proof +T0014 Prepare fundraising campaigns +T0098 Establish Inauthentic News Sites +T0120 Incentivize Sharing +T0124 Suppress Opposition + + + +T0077 Distract + +T0085 Develop Text-based Content +T0105 Media Sharing Networks +T0045 Use fake experts + +T0127 Physical Violence +T0130 Conceal Infrastructure + + +T0068 Respond to Breaking News Event or Active Crisis +T0065 Prepare Physical Broadcast Capabilities +T0099 Prepare Assets Impersonating Legitimate Entities +T0121 Manipulate Platform Algorithm +T0125 Platform Filtering + + + +T0078 Dismay + +T0086 Develop Image-based Content +T0106 Discussion Forums +T0046 Use Search Engine Optimization + + +T0131 Exploit TOS/Content Moderation + + +T0082 Develop New Narratives +T0090 Create Inauthentic Accounts +T0100 Co-opt Trusted Sources +T0122 Direct Users to Alternative Platforms -T0007 Divide +T0079 Divide -T0017 Integrate Target Audience Vulnerabilities into Narrative -T0024 Develop Audio-based Content -T0033 Acquire/ recruit Network -T0045 Prepare Assets Impersonating Legitimate Entities +T0087 Develop Video-based Content +T0107 Bookmarking and Content Curation +T0113 Employ Commercial Analytic Firms -T0055 Discussion Forums -T0067 Use fake experts -T0078 Manipulate Platform Algorithm -T0084 Platform Filtering -T0089 Merchandising/ Advertising -T0094 Play the long game - - -T0008 Degrade Adversary - -T0018 Respond to Breaking News Event or Active Crisis -T0025 Generate information pollution -T0034 Infiltrate Existing Networks -T0046 Co-opt Trusted Sources - -T0056 Bookmarking and Content Curation -T0068 Use Search Engine Optimization - -T0079 Direct Users to Alternative Platforms +T0083 Integrate Target Audience Vulnerabilities into Narrative +T0091 Recruit bad actors -T0009 Facilitate State Propaganda - -T0019 Demand insurmountable proof -T0026 Distort facts -T0035 Create Inauthentic Social Media Pages and Groups -T0057 Blogging and Publishing Networks -T0069 Employ Commercial Analytic Firms +T0088 Develop Audio-based Content +T0108 Blogging and Publishing Networks + +T0092 Build Network + + + + + + + + +T0089 Obtain Private Documents +T0109 Consumer Review Networks + + + + + + + +T0093 Acquire/ recruit Network + + + -T0027 Create hashtags and search artifacts -T0036 Create inauthentic websites - - -T0058 Consumer Review Networks +T0110 Formal Diplomatic Channels @@ -202,17 +234,17 @@ function handleTechniqueClick(box) { +T0094 Infiltrate Existing Networks + + + -T0028 Obtain Private Documents -T0037 Prepare Physical Broadcast Capabilities - - -T0059 Online polls +T0111 Traditional Media @@ -220,17 +252,17 @@ function handleTechniqueClick(box) { +T0095 Develop Owned Media Assets + + + - -T0038 Develop Owned Media Assets - - -T0060 Formal Diplomatic Channels +T0112 Email @@ -238,39 +270,7 @@ function handleTechniqueClick(box) { - - - - - - - -T0039 Prepare fundraising campaigns - - -T0061 Traditional Media - - - - - - - - - - - - - - -T0040 Leverage Content Farm - - -T0062 Email - - - - +T0096 Leverage Content Farm @@ -280,103 +280,104 @@ function handleTechniqueClick(box) {
diff --git a/generated_files/red_framework_ids.csv b/generated_files/red_framework_ids.csv index 20c8965..f231c3c 100644 --- a/generated_files/red_framework_ids.csv +++ b/generated_files/red_framework_ids.csv @@ -1,14 +1,14 @@ -P01,P01,P01,P02,P02,P02,P02,P02,P02,P03,P03,P03,P03,P03,P03,P04 -TA01,TA02,TA03,TA04,TA05,TA06,TA07,TA08,TA09,TA10,TA11,TA12,TA13,TA14,TA15,TA16 -T0001,T0003,T0010,T0013,T0020,T0029,T0041,T0047,T0051,T0063,T0070,T0074,T0080,T0085,T0090,T0095 -T0002,T0004,T0011,T0014,T0021,T0030,T0042,T0048,T0052,T0064,T0071,T0075,T0081,T0086,T0091,T0096 -,T0005,T0012,T0015,T0022,T0031,T0043,T0049,T0053,T0065,T0072,T0076,T0082,T0087,T0092,T0097 -,T0006,,T0016,T0023,T0032,T0044,T0050,T0054,T0066,T0073,T0077,T0083,T0088,T0093, -,T0007,,T0017,T0024,T0033,T0045,,T0055,T0067,,T0078,T0084,T0089,T0094, -,T0008,,T0018,T0025,T0034,T0046,,T0056,T0068,,T0079,,,, -,T0009,,T0019,T0026,T0035,,,T0057,T0069,,,,,, -,,,,T0027,T0036,,,T0058,,,,,,, -,,,,T0028,T0037,,,T0059,,,,,,, -,,,,,T0038,,,T0060,,,,,,, -,,,,,T0039,,,T0061,,,,,,, -,,,,,T0040,,,T0062,,,,,,, +P01,P01,P02,P02,P02,P03,P03,P03,P03,P04,P01,P02,P02,P02,P03,P03 +TA01,TA02,TA05,TA06,TA07,TA08,TA09,TA10,TA11,TA12,TA13,TA14,TA15,TA16,TA17,TA18 +T0073,T0002,T0016,T0015,T0029,T0020,T0114,T0017,T0059,T0132,T0072,T0003,T0007,T0009,T0049,T0047 +T0074,T0066,T0018,T0019,T0043,T0039 ,T0115,T0057,T0060,T0133,T0080,T0004,T0010,T0011,T0118,T0048 +,T0075,T0101,T0023,T0103,T0042,T0116,T0061,T0128,T0134,T0081,T0022,T0013,T0097,T0119,T0123 +,T0076,T0102,T0084,T0104,T0044,T0117,T0126,T0129,,,T0040,T0014,T0098,T0120,T0124 +,T0077,,T0085,T0105,T0045,,T0127,T0130,,,T0068,T0065,T0099,T0121,T0125 +,T0078,,T0086,T0106,T0046,,,T0131,,,T0082,T0090,T0100,T0122, +,T0079,,T0087,T0107,T0113,,,,,,T0083,T0091,,, +,,,T0088,T0108,,,,,,,,T0092,,, +,,,T0089,T0109,,,,,,,,T0093,,, +,,,,T0110,,,,,,,,T0094,,, +,,,,T0111,,,,,,,,T0095,,, +,,,,T0112,,,,,,,,T0096,,, diff --git a/generated_pages/counters/C00006.md b/generated_pages/counters/C00006.md index 731c404..8cd45bf 100644 --- a/generated_pages/counters/C00006.md +++ b/generated_pages/counters/C00006.md @@ -24,12 +24,10 @@ | Counters these Techniques | | ------------------------- | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | -| [T0043 Create personas](../generated_pages/techniques/T0043.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | +| [T0015 Create hashtags and search artifacts](../generated_pages/techniques/T0015.md) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | +| [T0043 Chat apps](../generated_pages/techniques/T0043.md) | diff --git a/generated_pages/counters/C00008.md b/generated_pages/counters/C00008.md index 4a479c8..f6d72e0 100644 --- a/generated_pages/counters/C00008.md +++ b/generated_pages/counters/C00008.md @@ -24,24 +24,13 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | -| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | -| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | -| [T0006 Dismay](../generated_pages/techniques/T0006.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | +| [T0013 Create inauthentic websites](../generated_pages/techniques/T0013.md) | +| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | diff --git a/generated_pages/counters/C00009.md b/generated_pages/counters/C00009.md index 07b44fb..5b67e56 100644 --- a/generated_pages/counters/C00009.md +++ b/generated_pages/counters/C00009.md @@ -25,15 +25,10 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0042 Create fake experts](../generated_pages/techniques/T0042.md) | -| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0042 Seed Kernel of truth](../generated_pages/techniques/T0042.md) | +| [T0048 Harass](../generated_pages/techniques/T0048.md) | diff --git a/generated_pages/counters/C00010.md b/generated_pages/counters/C00010.md index ecfb4bd..f34ec6e 100644 --- a/generated_pages/counters/C00010.md +++ b/generated_pages/counters/C00010.md @@ -24,8 +24,7 @@ | Counters these Techniques | | ------------------------- | -| [T0005 Distract](../generated_pages/techniques/T0005.md) | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | diff --git a/generated_pages/counters/C00011.md b/generated_pages/counters/C00011.md index 9518fba..919656b 100644 --- a/generated_pages/counters/C00011.md +++ b/generated_pages/counters/C00011.md @@ -26,23 +26,12 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | -| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | -| [T0006 Dismay](../generated_pages/techniques/T0006.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | +| [T0013 Create inauthentic websites](../generated_pages/techniques/T0013.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | diff --git a/generated_pages/counters/C00012.md b/generated_pages/counters/C00012.md index 50d4240..7fd5f39 100644 --- a/generated_pages/counters/C00012.md +++ b/generated_pages/counters/C00012.md @@ -26,38 +26,25 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | -| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | -| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | -| [T0047 Create Clickbait](../generated_pages/techniques/T0047.md) | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0043 Create personas](../generated_pages/techniques/T0043.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | -| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | -| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | -| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | -| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | -| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | -| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | -| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | +| [T0048 Harass](../generated_pages/techniques/T0048.md) | +| [T0047 Censor social media as a political force](../generated_pages/techniques/T0047.md) | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0043 Chat apps](../generated_pages/techniques/T0043.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | +| [T0016 Create Clickbait](../generated_pages/techniques/T0016.md) | +| [T0015 Create hashtags and search artifacts](../generated_pages/techniques/T0015.md) | +| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | +| [T0013 Create inauthentic websites](../generated_pages/techniques/T0013.md) | +| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | +| [T0061 Sell Merchandise](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00013.md b/generated_pages/counters/C00013.md index 8921a6e..7a194d5 100644 --- a/generated_pages/counters/C00013.md +++ b/generated_pages/counters/C00013.md @@ -23,13 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | diff --git a/generated_pages/counters/C00014.md b/generated_pages/counters/C00014.md index 27996e1..b2d30d9 100644 --- a/generated_pages/counters/C00014.md +++ b/generated_pages/counters/C00014.md @@ -24,24 +24,13 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | -| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | -| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | -| [T0006 Dismay](../generated_pages/techniques/T0006.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | +| [T0013 Create inauthentic websites](../generated_pages/techniques/T0013.md) | +| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | diff --git a/generated_pages/counters/C00016.md b/generated_pages/counters/C00016.md index f9b0164..b1b85b4 100644 --- a/generated_pages/counters/C00016.md +++ b/generated_pages/counters/C00016.md @@ -24,37 +24,22 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | -| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0043 Create personas](../generated_pages/techniques/T0043.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | -| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | -| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | -| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | -| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | -| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | -| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | +| [T0013 Create inauthentic websites](../generated_pages/techniques/T0013.md) | +| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | +| [T0015 Create hashtags and search artifacts](../generated_pages/techniques/T0015.md) | +| [T0016 Create Clickbait](../generated_pages/techniques/T0016.md) | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0043 Chat apps](../generated_pages/techniques/T0043.md) | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | diff --git a/generated_pages/counters/C00017.md b/generated_pages/counters/C00017.md index 8105ff1..380437d 100644 --- a/generated_pages/counters/C00017.md +++ b/generated_pages/counters/C00017.md @@ -24,13 +24,10 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | diff --git a/generated_pages/counters/C00019.md b/generated_pages/counters/C00019.md index 5577e55..c12ad1d 100644 --- a/generated_pages/counters/C00019.md +++ b/generated_pages/counters/C00019.md @@ -23,17 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | diff --git a/generated_pages/counters/C00021.md b/generated_pages/counters/C00021.md index c858e45..abfd9de 100644 --- a/generated_pages/counters/C00021.md +++ b/generated_pages/counters/C00021.md @@ -23,16 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0006 Dismay](../generated_pages/techniques/T0006.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | diff --git a/generated_pages/counters/C00022.md b/generated_pages/counters/C00022.md index c944d92..340683e 100644 --- a/generated_pages/counters/C00022.md +++ b/generated_pages/counters/C00022.md @@ -23,16 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0006 Dismay](../generated_pages/techniques/T0006.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | diff --git a/generated_pages/counters/C00024.md b/generated_pages/counters/C00024.md index a9c94d1..29a103b 100644 --- a/generated_pages/counters/C00024.md +++ b/generated_pages/counters/C00024.md @@ -23,16 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0006 Dismay](../generated_pages/techniques/T0006.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | diff --git a/generated_pages/counters/C00026.md b/generated_pages/counters/C00026.md index 5ec99be..861e0f5 100644 --- a/generated_pages/counters/C00026.md +++ b/generated_pages/counters/C00026.md @@ -23,8 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | diff --git a/generated_pages/counters/C00027.md b/generated_pages/counters/C00027.md index 11ea50e..7e3ce69 100644 --- a/generated_pages/counters/C00027.md +++ b/generated_pages/counters/C00027.md @@ -23,19 +23,12 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0006 Dismay](../generated_pages/techniques/T0006.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | -| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | +| [T0048 Harass](../generated_pages/techniques/T0048.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | diff --git a/generated_pages/counters/C00029.md b/generated_pages/counters/C00029.md index 1eb11f1..1ee3032 100644 --- a/generated_pages/counters/C00029.md +++ b/generated_pages/counters/C00029.md @@ -23,12 +23,9 @@ | Counters these Techniques | | ------------------------- | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0006 Dismay](../generated_pages/techniques/T0006.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | diff --git a/generated_pages/counters/C00030.md b/generated_pages/counters/C00030.md index f38fcae..4d2b745 100644 --- a/generated_pages/counters/C00030.md +++ b/generated_pages/counters/C00030.md @@ -23,12 +23,9 @@ | Counters these Techniques | | ------------------------- | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0006 Dismay](../generated_pages/techniques/T0006.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | diff --git a/generated_pages/counters/C00031.md b/generated_pages/counters/C00031.md index 549b536..a8c3467 100644 --- a/generated_pages/counters/C00031.md +++ b/generated_pages/counters/C00031.md @@ -23,11 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0006 Dismay](../generated_pages/techniques/T0006.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | diff --git a/generated_pages/counters/C00032.md b/generated_pages/counters/C00032.md index 72fa9de..99c05ab 100644 --- a/generated_pages/counters/C00032.md +++ b/generated_pages/counters/C00032.md @@ -23,7 +23,6 @@ | Counters these Techniques | | ------------------------- | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | diff --git a/generated_pages/counters/C00034.md b/generated_pages/counters/C00034.md index b243baa..e87ffb0 100644 --- a/generated_pages/counters/C00034.md +++ b/generated_pages/counters/C00034.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -23,10 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0012 Segment Audiences](../generated_pages/techniques/T0012.md) | -| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | +| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | diff --git a/generated_pages/counters/C00036.md b/generated_pages/counters/C00036.md index f993eee..9d7ff9a 100644 --- a/generated_pages/counters/C00036.md +++ b/generated_pages/counters/C00036.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -23,14 +23,10 @@ | Counters these Techniques | | ------------------------- | -| [T0005 Distract](../generated_pages/techniques/T0005.md) | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0012 Segment Audiences](../generated_pages/techniques/T0012.md) | -| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | diff --git a/generated_pages/counters/C00040.md b/generated_pages/counters/C00040.md index 411c461..046648e 100644 --- a/generated_pages/counters/C00040.md +++ b/generated_pages/counters/C00040.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -23,9 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | -| [T0012 Segment Audiences](../generated_pages/techniques/T0012.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | +| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | diff --git a/generated_pages/counters/C00042.md b/generated_pages/counters/C00042.md index 27b6c28..8174089 100644 --- a/generated_pages/counters/C00042.md +++ b/generated_pages/counters/C00042.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -23,15 +23,12 @@ | Counters these Techniques | | ------------------------- | -| [T0004 Distort](../generated_pages/techniques/T0004.md) | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0042 Create fake experts](../generated_pages/techniques/T0042.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0059 Online polls](../generated_pages/techniques/T0059.md) | +| [T0004 Develop Competing Narratives](../generated_pages/techniques/T0004.md) | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0042 Seed Kernel of truth](../generated_pages/techniques/T0042.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0059 Play the long game](../generated_pages/techniques/T0059.md) | diff --git a/generated_pages/counters/C00044.md b/generated_pages/counters/C00044.md index 33be3a1..4300b95 100644 --- a/generated_pages/counters/C00044.md +++ b/generated_pages/counters/C00044.md @@ -8,7 +8,7 @@ * **Resources needed:** R004 - platform algorithms -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -24,14 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0029 Create Inauthentic Accounts](../generated_pages/techniques/T0029.md) | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | -| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | +| [T0029 Online polls](../generated_pages/techniques/T0029.md) | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | diff --git a/generated_pages/counters/C00046.md b/generated_pages/counters/C00046.md index ea72f1b..c686a2e 100644 --- a/generated_pages/counters/C00046.md +++ b/generated_pages/counters/C00046.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -23,23 +23,15 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | -| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | -| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0048 Harass](../generated_pages/techniques/T0048.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | +| [T0060 Continue to Amplify](../generated_pages/techniques/T0060.md) | +| [T0061 Sell Merchandise](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00047.md b/generated_pages/counters/C00047.md index 0f142d3..638d42a 100644 --- a/generated_pages/counters/C00047.md +++ b/generated_pages/counters/C00047.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -23,8 +23,6 @@ | Counters these Techniques | | ------------------------- | -| [T0063 Trial content](../generated_pages/techniques/T0063.md) | -| [T0062 Email](../generated_pages/techniques/T0062.md) | diff --git a/generated_pages/counters/C00048.md b/generated_pages/counters/C00048.md index 9e02ab6..977c715 100644 --- a/generated_pages/counters/C00048.md +++ b/generated_pages/counters/C00048.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -23,17 +23,12 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | -| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | -| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | -| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0048 Harass](../generated_pages/techniques/T0048.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | +| [T0060 Continue to Amplify](../generated_pages/techniques/T0060.md) | +| [T0061 Sell Merchandise](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00051.md b/generated_pages/counters/C00051.md index 6751a95..be995c7 100644 --- a/generated_pages/counters/C00051.md +++ b/generated_pages/counters/C00051.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -24,8 +24,7 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0012 Segment Audiences](../generated_pages/techniques/T0012.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | diff --git a/generated_pages/counters/C00052.md b/generated_pages/counters/C00052.md index 3cbe308..9e13589 100644 --- a/generated_pages/counters/C00052.md +++ b/generated_pages/counters/C00052.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -24,8 +24,6 @@ | Counters these Techniques | | ------------------------- | -| [T0012 Segment Audiences](../generated_pages/techniques/T0012.md) | -| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | diff --git a/generated_pages/counters/C00053.md b/generated_pages/counters/C00053.md index 2d0021e..ca838ba 100644 --- a/generated_pages/counters/C00053.md +++ b/generated_pages/counters/C00053.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -26,8 +26,7 @@ | Counters these Techniques | | ------------------------- | -| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | -| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | +| [T0011 Compromise legitimate accounts](../generated_pages/techniques/T0011.md) | diff --git a/generated_pages/counters/C00056.md b/generated_pages/counters/C00056.md index 5b6d760..624a4b1 100644 --- a/generated_pages/counters/C00056.md +++ b/generated_pages/counters/C00056.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | diff --git a/generated_pages/counters/C00058.md b/generated_pages/counters/C00058.md index 2068c11..12b9a09 100644 --- a/generated_pages/counters/C00058.md +++ b/generated_pages/counters/C00058.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -23,8 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | -| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | +| [T0061 Sell Merchandise](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00059.md b/generated_pages/counters/C00059.md index 6199254..367fc7c 100644 --- a/generated_pages/counters/C00059.md +++ b/generated_pages/counters/C00059.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | +| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | diff --git a/generated_pages/counters/C00060.md b/generated_pages/counters/C00060.md index b31cc05..b2394e5 100644 --- a/generated_pages/counters/C00060.md +++ b/generated_pages/counters/C00060.md @@ -24,7 +24,7 @@ | Counters these Techniques | | ------------------------- | -| [T0047 Create Clickbait](../generated_pages/techniques/T0047.md) | +| [T0047 Censor social media as a political force](../generated_pages/techniques/T0047.md) | diff --git a/generated_pages/counters/C00062.md b/generated_pages/counters/C00062.md index 28f809f..e297510 100644 --- a/generated_pages/counters/C00062.md +++ b/generated_pages/counters/C00062.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | diff --git a/generated_pages/counters/C00065.md b/generated_pages/counters/C00065.md index 9f1eb0a..8e3f1e8 100644 --- a/generated_pages/counters/C00065.md +++ b/generated_pages/counters/C00065.md @@ -24,7 +24,7 @@ | Counters these Techniques | | ------------------------- | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | diff --git a/generated_pages/counters/C00066.md b/generated_pages/counters/C00066.md index 3f59a46..b13dd4c 100644 --- a/generated_pages/counters/C00066.md +++ b/generated_pages/counters/C00066.md @@ -23,8 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0015 Create hashtags and search artifacts](../generated_pages/techniques/T0015.md) | diff --git a/generated_pages/counters/C00067.md b/generated_pages/counters/C00067.md index 4795d28..dbbe875 100644 --- a/generated_pages/counters/C00067.md +++ b/generated_pages/counters/C00067.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -23,8 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | -| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | +| [T0061 Sell Merchandise](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00070.md b/generated_pages/counters/C00070.md index 94b4ff9..2e7d4aa 100644 --- a/generated_pages/counters/C00070.md +++ b/generated_pages/counters/C00070.md @@ -31,16 +31,11 @@ T0046 - Search Engine Optimization: Sub-optimal website performance affect its s | Counters these Techniques | | ------------------------- | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | -| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | -| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | -| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | +| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | +| [T0015 Create hashtags and search artifacts](../generated_pages/techniques/T0015.md) | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | diff --git a/generated_pages/counters/C00071.md b/generated_pages/counters/C00071.md index 0cb6ea9..69445ce 100644 --- a/generated_pages/counters/C00071.md +++ b/generated_pages/counters/C00071.md @@ -23,8 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | diff --git a/generated_pages/counters/C00072.md b/generated_pages/counters/C00072.md index b061f01..eb043fd 100644 --- a/generated_pages/counters/C00072.md +++ b/generated_pages/counters/C00072.md @@ -23,16 +23,12 @@ | Counters these Techniques | | ------------------------- | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | diff --git a/generated_pages/counters/C00073.md b/generated_pages/counters/C00073.md index 338e044..37e3a5f 100644 --- a/generated_pages/counters/C00073.md +++ b/generated_pages/counters/C00073.md @@ -31,24 +31,16 @@ | Counters these Techniques | | ------------------------- | -| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | -| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0040 Leverage Content Farm](../generated_pages/techniques/T0040.md) | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | +| [T0016 Create Clickbait](../generated_pages/techniques/T0016.md) | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | +| [T0040 Demand insurmountable proof](../generated_pages/techniques/T0040.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0048 Harass](../generated_pages/techniques/T0048.md) | +| [T0060 Continue to Amplify](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00074.md b/generated_pages/counters/C00074.md index 356190d..7829be0 100644 --- a/generated_pages/counters/C00074.md +++ b/generated_pages/counters/C00074.md @@ -25,22 +25,13 @@ | Counters these Techniques | | ------------------------- | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0043 Create personas](../generated_pages/techniques/T0043.md) | -| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | -| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | -| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | -| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0043 Chat apps](../generated_pages/techniques/T0043.md) | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | +| [T0061 Sell Merchandise](../generated_pages/techniques/T0061.md) | +| [T0060 Continue to Amplify](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00076.md b/generated_pages/counters/C00076.md index 42fb399..2a70bc1 100644 --- a/generated_pages/counters/C00076.md +++ b/generated_pages/counters/C00076.md @@ -23,11 +23,9 @@ | Counters these Techniques | | ------------------------- | -| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | +| [T0016 Create Clickbait](../generated_pages/techniques/T0016.md) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | diff --git a/generated_pages/counters/C00077.md b/generated_pages/counters/C00077.md index cf46afc..c3d36ff 100644 --- a/generated_pages/counters/C00077.md +++ b/generated_pages/counters/C00077.md @@ -1,4 +1,4 @@ -# Counter C00077: Active defence: run TA03 "develop people” - not recommended +# Counter C00077: Active defence: run TA15 "develop people” - not recommended * **Summary**: Develop networks of communities and influencers around counter-misinformation. Match them to misinformation creators @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | diff --git a/generated_pages/counters/C00078.md b/generated_pages/counters/C00078.md index fda7724..a849ccc 100644 --- a/generated_pages/counters/C00078.md +++ b/generated_pages/counters/C00078.md @@ -23,11 +23,9 @@ | Counters these Techniques | | ------------------------- | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | +| [T0060 Continue to Amplify](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00080.md b/generated_pages/counters/C00080.md index d5a4696..326791e 100644 --- a/generated_pages/counters/C00080.md +++ b/generated_pages/counters/C00080.md @@ -23,11 +23,9 @@ | Counters these Techniques | | ------------------------- | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0004 Distort](../generated_pages/techniques/T0004.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0004 Develop Competing Narratives](../generated_pages/techniques/T0004.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | diff --git a/generated_pages/counters/C00081.md b/generated_pages/counters/C00081.md index 01a98f1..e942863 100644 --- a/generated_pages/counters/C00081.md +++ b/generated_pages/counters/C00081.md @@ -23,19 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0004 Distort](../generated_pages/techniques/T0004.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0006 Dismay](../generated_pages/techniques/T0006.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0004 Develop Competing Narratives](../generated_pages/techniques/T0004.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | diff --git a/generated_pages/counters/C00082.md b/generated_pages/counters/C00082.md index faffb28..e722e15 100644 --- a/generated_pages/counters/C00082.md +++ b/generated_pages/counters/C00082.md @@ -23,21 +23,12 @@ | Counters these Techniques | | ------------------------- | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0004 Distort](../generated_pages/techniques/T0004.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0006 Dismay](../generated_pages/techniques/T0006.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0004 Develop Competing Narratives](../generated_pages/techniques/T0004.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | diff --git a/generated_pages/counters/C00084.md b/generated_pages/counters/C00084.md index c89e028..f49d9cb 100644 --- a/generated_pages/counters/C00084.md +++ b/generated_pages/counters/C00084.md @@ -23,14 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0004 Distort](../generated_pages/techniques/T0004.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0006 Dismay](../generated_pages/techniques/T0006.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0059 Online polls](../generated_pages/techniques/T0059.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0004 Develop Competing Narratives](../generated_pages/techniques/T0004.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0059 Play the long game](../generated_pages/techniques/T0059.md) | diff --git a/generated_pages/counters/C00085.md b/generated_pages/counters/C00085.md index 7ede1be..8cc012b 100644 --- a/generated_pages/counters/C00085.md +++ b/generated_pages/counters/C00085.md @@ -25,26 +25,15 @@ Online archives of content (archives of websites, social media profiles, media, | Counters these Techniques | | ------------------------- | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | -| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | +| [T0061 Sell Merchandise](../generated_pages/techniques/T0061.md) | +| [T0060 Continue to Amplify](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00086.md b/generated_pages/counters/C00086.md index 33dc49c..386865f 100644 --- a/generated_pages/counters/C00086.md +++ b/generated_pages/counters/C00086.md @@ -23,13 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | -| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | diff --git a/generated_pages/counters/C00087.md b/generated_pages/counters/C00087.md index 70615d9..ba9ad97 100644 --- a/generated_pages/counters/C00087.md +++ b/generated_pages/counters/C00087.md @@ -23,17 +23,9 @@ | Counters these Techniques | | ------------------------- | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | -| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | -| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0048 Harass](../generated_pages/techniques/T0048.md) | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | diff --git a/generated_pages/counters/C00090.md b/generated_pages/counters/C00090.md index edb6a5a..086a524 100644 --- a/generated_pages/counters/C00090.md +++ b/generated_pages/counters/C00090.md @@ -23,9 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | -| [T0062 Email](../generated_pages/techniques/T0062.md) | -| [T0063 Trial content](../generated_pages/techniques/T0063.md) | +| [T0020 Trial content](../generated_pages/techniques/T0020.md) | diff --git a/generated_pages/counters/C00091.md b/generated_pages/counters/C00091.md index b62f502..4b36e8e 100644 --- a/generated_pages/counters/C00091.md +++ b/generated_pages/counters/C00091.md @@ -23,11 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0062 Email](../generated_pages/techniques/T0062.md) | -| [T0063 Trial content](../generated_pages/techniques/T0063.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | diff --git a/generated_pages/counters/C00092.md b/generated_pages/counters/C00092.md index 4ac38ee..585bc51 100644 --- a/generated_pages/counters/C00092.md +++ b/generated_pages/counters/C00092.md @@ -24,14 +24,10 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | diff --git a/generated_pages/counters/C00093.md b/generated_pages/counters/C00093.md index aa2b51f..0eeb9da 100644 --- a/generated_pages/counters/C00093.md +++ b/generated_pages/counters/C00093.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -23,12 +23,10 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | -| [T0047 Create Clickbait](../generated_pages/techniques/T0047.md) | -| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | +| [T0047 Censor social media as a political force](../generated_pages/techniques/T0047.md) | +| [T0048 Harass](../generated_pages/techniques/T0048.md) | diff --git a/generated_pages/counters/C00094.md b/generated_pages/counters/C00094.md index f06c435..34ff7c4 100644 --- a/generated_pages/counters/C00094.md +++ b/generated_pages/counters/C00094.md @@ -23,7 +23,6 @@ | Counters these Techniques | | ------------------------- | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | diff --git a/generated_pages/counters/C00096.md b/generated_pages/counters/C00096.md index a710c68..df72ad6 100644 --- a/generated_pages/counters/C00096.md +++ b/generated_pages/counters/C00096.md @@ -23,12 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | -| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | diff --git a/generated_pages/counters/C00097.md b/generated_pages/counters/C00097.md index 6cd7d93..9f7271d 100644 --- a/generated_pages/counters/C00097.md +++ b/generated_pages/counters/C00097.md @@ -24,13 +24,10 @@ | Counters these Techniques | | ------------------------- | -| [T0029 Create Inauthentic Accounts](../generated_pages/techniques/T0029.md) | -| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0029 Online polls](../generated_pages/techniques/T0029.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | diff --git a/generated_pages/counters/C00098.md b/generated_pages/counters/C00098.md index 9c0030e..c2509e4 100644 --- a/generated_pages/counters/C00098.md +++ b/generated_pages/counters/C00098.md @@ -24,8 +24,7 @@ | Counters these Techniques | | ------------------------- | -| [T0038 Develop Owned Media Assets](../generated_pages/techniques/T0038.md) | -| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | +| [T0011 Compromise legitimate accounts](../generated_pages/techniques/T0011.md) | diff --git a/generated_pages/counters/C00099.md b/generated_pages/counters/C00099.md index 846319d..ddc1fad 100644 --- a/generated_pages/counters/C00099.md +++ b/generated_pages/counters/C00099.md @@ -24,11 +24,9 @@ | Counters these Techniques | | ------------------------- | -| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | diff --git a/generated_pages/counters/C00100.md b/generated_pages/counters/C00100.md index 425c5c5..d6e1893 100644 --- a/generated_pages/counters/C00100.md +++ b/generated_pages/counters/C00100.md @@ -23,7 +23,6 @@ | Counters these Techniques | | ------------------------- | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | diff --git a/generated_pages/counters/C00101.md b/generated_pages/counters/C00101.md index c55d315..cb7d212 100644 --- a/generated_pages/counters/C00101.md +++ b/generated_pages/counters/C00101.md @@ -24,10 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0029 Create Inauthentic Accounts](../generated_pages/techniques/T0029.md) | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0029 Online polls](../generated_pages/techniques/T0029.md) | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | diff --git a/generated_pages/counters/C00103.md b/generated_pages/counters/C00103.md index d652497..7fb47aa 100644 --- a/generated_pages/counters/C00103.md +++ b/generated_pages/counters/C00103.md @@ -24,10 +24,7 @@ | Counters these Techniques | | ------------------------- | -| [T0029 Create Inauthentic Accounts](../generated_pages/techniques/T0029.md) | -| [T0062 Email](../generated_pages/techniques/T0062.md) | -| [T0063 Trial content](../generated_pages/techniques/T0063.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | +| [T0029 Online polls](../generated_pages/techniques/T0029.md) | diff --git a/generated_pages/counters/C00105.md b/generated_pages/counters/C00105.md index c428b0d..c5a7f4e 100644 --- a/generated_pages/counters/C00105.md +++ b/generated_pages/counters/C00105.md @@ -24,8 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | +| [T0016 Create Clickbait](../generated_pages/techniques/T0016.md) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | diff --git a/generated_pages/counters/C00106.md b/generated_pages/counters/C00106.md index d9e8baa..38e90a2 100644 --- a/generated_pages/counters/C00106.md +++ b/generated_pages/counters/C00106.md @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | +| [T0016 Create Clickbait](../generated_pages/techniques/T0016.md) | diff --git a/generated_pages/counters/C00107.md b/generated_pages/counters/C00107.md index 37ca503..d2b7ac9 100644 --- a/generated_pages/counters/C00107.md +++ b/generated_pages/counters/C00107.md @@ -24,26 +24,18 @@ | Counters these Techniques | | ------------------------- | -| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | -| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | -| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | -| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | -| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | -| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | +| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | +| [T0013 Create inauthentic websites](../generated_pages/techniques/T0013.md) | +| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | +| [T0015 Create hashtags and search artifacts](../generated_pages/techniques/T0015.md) | +| [T0016 Create Clickbait](../generated_pages/techniques/T0016.md) | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0061 Sell Merchandise](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00111.md b/generated_pages/counters/C00111.md index 59abe55..da46cf2 100644 --- a/generated_pages/counters/C00111.md +++ b/generated_pages/counters/C00111.md @@ -25,7 +25,7 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | diff --git a/generated_pages/counters/C00112.md b/generated_pages/counters/C00112.md index 4754dc4..ef0563d 100644 --- a/generated_pages/counters/C00112.md +++ b/generated_pages/counters/C00112.md @@ -23,8 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0040 Leverage Content Farm](../generated_pages/techniques/T0040.md) | -| [T0042 Create fake experts](../generated_pages/techniques/T0042.md) | +| [T0040 Demand insurmountable proof](../generated_pages/techniques/T0040.md) | +| [T0042 Seed Kernel of truth](../generated_pages/techniques/T0042.md) | diff --git a/generated_pages/counters/C00113.md b/generated_pages/counters/C00113.md index 277683e..b3fff71 100644 --- a/generated_pages/counters/C00113.md +++ b/generated_pages/counters/C00113.md @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | diff --git a/generated_pages/counters/C00114.md b/generated_pages/counters/C00114.md index 0777899..0c13fc4 100644 --- a/generated_pages/counters/C00114.md +++ b/generated_pages/counters/C00114.md @@ -24,8 +24,7 @@ | Counters these Techniques | | ------------------------- | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | -| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | +| [T0048 Harass](../generated_pages/techniques/T0048.md) | diff --git a/generated_pages/counters/C00115.md b/generated_pages/counters/C00115.md index 807b697..670692d 100644 --- a/generated_pages/counters/C00115.md +++ b/generated_pages/counters/C00115.md @@ -23,11 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0041 Compromise legitimate accounts](../generated_pages/techniques/T0041.md) | -| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0048 Harass](../generated_pages/techniques/T0048.md) | diff --git a/generated_pages/counters/C00116.md b/generated_pages/counters/C00116.md index dc2df61..88d07f7 100644 --- a/generated_pages/counters/C00116.md +++ b/generated_pages/counters/C00116.md @@ -23,7 +23,6 @@ | Counters these Techniques | | ------------------------- | -| [T0041 Compromise legitimate accounts](../generated_pages/techniques/T0041.md) | diff --git a/generated_pages/counters/C00117.md b/generated_pages/counters/C00117.md index 23325f4..6a47ff9 100644 --- a/generated_pages/counters/C00117.md +++ b/generated_pages/counters/C00117.md @@ -23,15 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0060 Continue to Amplify](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00118.md b/generated_pages/counters/C00118.md index bc3de73..12ed30d 100644 --- a/generated_pages/counters/C00118.md +++ b/generated_pages/counters/C00118.md @@ -23,9 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | diff --git a/generated_pages/counters/C00119.md b/generated_pages/counters/C00119.md index 4e998fa..e493264 100644 --- a/generated_pages/counters/C00119.md +++ b/generated_pages/counters/C00119.md @@ -23,14 +23,10 @@ | Counters these Techniques | | ------------------------- | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0060 Continue to Amplify](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00120.md b/generated_pages/counters/C00120.md index 617e045..4569a17 100644 --- a/generated_pages/counters/C00120.md +++ b/generated_pages/counters/C00120.md @@ -23,12 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0047 Create Clickbait](../generated_pages/techniques/T0047.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0047 Censor social media as a political force](../generated_pages/techniques/T0047.md) | diff --git a/generated_pages/counters/C00121.md b/generated_pages/counters/C00121.md index 5368037..2838453 100644 --- a/generated_pages/counters/C00121.md +++ b/generated_pages/counters/C00121.md @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0043 Create personas](../generated_pages/techniques/T0043.md) | +| [T0043 Chat apps](../generated_pages/techniques/T0043.md) | diff --git a/generated_pages/counters/C00122.md b/generated_pages/counters/C00122.md index f640fbe..6d3f1ec 100644 --- a/generated_pages/counters/C00122.md +++ b/generated_pages/counters/C00122.md @@ -24,30 +24,19 @@ | Counters these Techniques | | ------------------------- | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | -| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | -| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | -| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | -| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | -| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | +| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | +| [T0015 Create hashtags and search artifacts](../generated_pages/techniques/T0015.md) | +| [T0016 Create Clickbait](../generated_pages/techniques/T0016.md) | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | +| [T0061 Sell Merchandise](../generated_pages/techniques/T0061.md) | +| [T0060 Continue to Amplify](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00123.md b/generated_pages/counters/C00123.md index 6291b75..cc2dc27 100644 --- a/generated_pages/counters/C00123.md +++ b/generated_pages/counters/C00123.md @@ -23,10 +23,9 @@ | Counters these Techniques | | ------------------------- | -| [T0029 Create Inauthentic Accounts](../generated_pages/techniques/T0029.md) | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | +| [T0029 Online polls](../generated_pages/techniques/T0029.md) | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | +| [T0060 Continue to Amplify](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00124.md b/generated_pages/counters/C00124.md index 422ae16..3574fb2 100644 --- a/generated_pages/counters/C00124.md +++ b/generated_pages/counters/C00124.md @@ -25,8 +25,6 @@ | Counters these Techniques | | ------------------------- | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0063 Trial content](../generated_pages/techniques/T0063.md) | diff --git a/generated_pages/counters/C00125.md b/generated_pages/counters/C00125.md index 0cd1796..36492b0 100644 --- a/generated_pages/counters/C00125.md +++ b/generated_pages/counters/C00125.md @@ -23,18 +23,12 @@ | Counters these Techniques | | ------------------------- | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0004 Distort](../generated_pages/techniques/T0004.md) | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0004 Develop Competing Narratives](../generated_pages/techniques/T0004.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | diff --git a/generated_pages/counters/C00126.md b/generated_pages/counters/C00126.md index 6a008fa..6266878 100644 --- a/generated_pages/counters/C00126.md +++ b/generated_pages/counters/C00126.md @@ -23,19 +23,13 @@ | Counters these Techniques | | ------------------------- | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0004 Distort](../generated_pages/techniques/T0004.md) | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0004 Develop Competing Narratives](../generated_pages/techniques/T0004.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | diff --git a/generated_pages/counters/C00128.md b/generated_pages/counters/C00128.md index ecd67fd..743d8a6 100644 --- a/generated_pages/counters/C00128.md +++ b/generated_pages/counters/C00128.md @@ -24,15 +24,9 @@ | Counters these Techniques | | ------------------------- | -| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | -| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | +| [T0061 Sell Merchandise](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00129.md b/generated_pages/counters/C00129.md index 97548e1..101a4cc 100644 --- a/generated_pages/counters/C00129.md +++ b/generated_pages/counters/C00129.md @@ -23,11 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | -| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | -| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | -| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | +| [T0061 Sell Merchandise](../generated_pages/techniques/T0061.md) | +| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | diff --git a/generated_pages/counters/C00130.md b/generated_pages/counters/C00130.md index 8a6239c..3082fcc 100644 --- a/generated_pages/counters/C00130.md +++ b/generated_pages/counters/C00130.md @@ -23,7 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | diff --git a/generated_pages/counters/C00131.md b/generated_pages/counters/C00131.md index 846c717..9ba42a3 100644 --- a/generated_pages/counters/C00131.md +++ b/generated_pages/counters/C00131.md @@ -24,9 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | +| [T0060 Continue to Amplify](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00133.md b/generated_pages/counters/C00133.md index 501f8cc..5b955a3 100644 --- a/generated_pages/counters/C00133.md +++ b/generated_pages/counters/C00133.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -24,11 +24,11 @@ | Counters these Techniques | | ------------------------- | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | +| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0011 Compromise legitimate accounts](../generated_pages/techniques/T0011.md) | diff --git a/generated_pages/counters/C00135.md b/generated_pages/counters/C00135.md index 6756822..ad063a0 100644 --- a/generated_pages/counters/C00135.md +++ b/generated_pages/counters/C00135.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -24,8 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0043 Create personas](../generated_pages/techniques/T0043.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | +| [T0043 Chat apps](../generated_pages/techniques/T0043.md) | diff --git a/generated_pages/counters/C00136.md b/generated_pages/counters/C00136.md index d0d2a81..0177140 100644 --- a/generated_pages/counters/C00136.md +++ b/generated_pages/counters/C00136.md @@ -23,9 +23,8 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | -| [T0063 Trial content](../generated_pages/techniques/T0063.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0020 Trial content](../generated_pages/techniques/T0020.md) | diff --git a/generated_pages/counters/C00138.md b/generated_pages/counters/C00138.md index 2ef8e95..5d7eae2 100644 --- a/generated_pages/counters/C00138.md +++ b/generated_pages/counters/C00138.md @@ -23,8 +23,7 @@ | Counters these Techniques | | ------------------------- | -| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | +| [T0060 Continue to Amplify](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00142.md b/generated_pages/counters/C00142.md index 9bbc690..f02376c 100644 --- a/generated_pages/counters/C00142.md +++ b/generated_pages/counters/C00142.md @@ -24,7 +24,7 @@ | Counters these Techniques | | ------------------------- | -| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | +| [T0016 Create Clickbait](../generated_pages/techniques/T0016.md) | diff --git a/generated_pages/counters/C00143.md b/generated_pages/counters/C00143.md index ae30758..4f63a16 100644 --- a/generated_pages/counters/C00143.md +++ b/generated_pages/counters/C00143.md @@ -25,9 +25,7 @@ | Counters these Techniques | | ------------------------- | -| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | -| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | +| [T0060 Continue to Amplify](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00144.md b/generated_pages/counters/C00144.md index 38ce103..ac11eae 100644 --- a/generated_pages/counters/C00144.md +++ b/generated_pages/counters/C00144.md @@ -23,7 +23,6 @@ | Counters these Techniques | | ------------------------- | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | diff --git a/generated_pages/counters/C00147.md b/generated_pages/counters/C00147.md index f854193..50adb8b 100644 --- a/generated_pages/counters/C00147.md +++ b/generated_pages/counters/C00147.md @@ -24,7 +24,7 @@ | Counters these Techniques | | ------------------------- | -| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | +| [T0060 Continue to Amplify](../generated_pages/techniques/T0060.md) | diff --git a/generated_pages/counters/C00148.md b/generated_pages/counters/C00148.md index cab0104..6b02d7c 100644 --- a/generated_pages/counters/C00148.md +++ b/generated_pages/counters/C00148.md @@ -24,8 +24,6 @@ | Counters these Techniques | | ------------------------- | -| [T0062 Email](../generated_pages/techniques/T0062.md) | -| [T0063 Trial content](../generated_pages/techniques/T0063.md) | diff --git a/generated_pages/counters/C00149.md b/generated_pages/counters/C00149.md index fa0475a..8440049 100644 --- a/generated_pages/counters/C00149.md +++ b/generated_pages/counters/C00149.md @@ -23,10 +23,9 @@ | Counters these Techniques | | ------------------------- | -| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | -| [T0063 Trial content](../generated_pages/techniques/T0063.md) | +| [T0020 Trial content](../generated_pages/techniques/T0020.md) | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | diff --git a/generated_pages/counters/C00153.md b/generated_pages/counters/C00153.md index 000b42c..2e33f41 100644 --- a/generated_pages/counters/C00153.md +++ b/generated_pages/counters/C00153.md @@ -24,21 +24,15 @@ | Counters these Techniques | | ------------------------- | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | -| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | -| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | -| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | -| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | +| [T0011 Compromise legitimate accounts](../generated_pages/techniques/T0011.md) | +| [T0013 Create inauthentic websites](../generated_pages/techniques/T0013.md) | +| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | +| [T0061 Sell Merchandise](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00154.md b/generated_pages/counters/C00154.md index 4170d40..7ae56ee 100644 --- a/generated_pages/counters/C00154.md +++ b/generated_pages/counters/C00154.md @@ -24,9 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | -| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | +| [T0048 Harass](../generated_pages/techniques/T0048.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | diff --git a/generated_pages/counters/C00155.md b/generated_pages/counters/C00155.md index 3f1d890..fd82728 100644 --- a/generated_pages/counters/C00155.md +++ b/generated_pages/counters/C00155.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -24,8 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | -| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | +| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | diff --git a/generated_pages/counters/C00156.md b/generated_pages/counters/C00156.md index e45a5c6..2ecbcfe 100644 --- a/generated_pages/counters/C00156.md +++ b/generated_pages/counters/C00156.md @@ -25,12 +25,11 @@ | Counters these Techniques | | ------------------------- | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0004 Distort](../generated_pages/techniques/T0004.md) | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0004 Develop Competing Narratives](../generated_pages/techniques/T0004.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | diff --git a/generated_pages/counters/C00160.md b/generated_pages/counters/C00160.md index 10f6f2c..b30967b 100644 --- a/generated_pages/counters/C00160.md +++ b/generated_pages/counters/C00160.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -25,9 +25,8 @@ | Counters these Techniques | | ------------------------- | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0048 Harass](../generated_pages/techniques/T0048.md) | diff --git a/generated_pages/counters/C00161.md b/generated_pages/counters/C00161.md index 1345d6a..6386840 100644 --- a/generated_pages/counters/C00161.md +++ b/generated_pages/counters/C00161.md @@ -23,11 +23,10 @@ | Counters these Techniques | | ------------------------- | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0004 Distort](../generated_pages/techniques/T0004.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0004 Develop Competing Narratives](../generated_pages/techniques/T0004.md) | diff --git a/generated_pages/counters/C00162.md b/generated_pages/counters/C00162.md index 2735059..80c5ba3 100644 --- a/generated_pages/counters/C00162.md +++ b/generated_pages/counters/C00162.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -23,16 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0004 Distort](../generated_pages/techniques/T0004.md) | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0004 Develop Competing Narratives](../generated_pages/techniques/T0004.md) | diff --git a/generated_pages/counters/C00164.md b/generated_pages/counters/C00164.md index 3b5f290..652c0d0 100644 --- a/generated_pages/counters/C00164.md +++ b/generated_pages/counters/C00164.md @@ -23,11 +23,10 @@ | Counters these Techniques | | ------------------------- | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0004 Distort](../generated_pages/techniques/T0004.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0004 Develop Competing Narratives](../generated_pages/techniques/T0004.md) | diff --git a/generated_pages/counters/C00165.md b/generated_pages/counters/C00165.md index f168139..d35c20e 100644 --- a/generated_pages/counters/C00165.md +++ b/generated_pages/counters/C00165.md @@ -23,7 +23,6 @@ | Counters these Techniques | | ------------------------- | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | diff --git a/generated_pages/counters/C00169.md b/generated_pages/counters/C00169.md index 04bbdb5..b059bcd 100644 --- a/generated_pages/counters/C00169.md +++ b/generated_pages/counters/C00169.md @@ -23,13 +23,11 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0004 Distort](../generated_pages/techniques/T0004.md) | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0004 Develop Competing Narratives](../generated_pages/techniques/T0004.md) | diff --git a/generated_pages/counters/C00172.md b/generated_pages/counters/C00172.md index 86c4c07..0181151 100644 --- a/generated_pages/counters/C00172.md +++ b/generated_pages/counters/C00172.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -24,9 +24,8 @@ | Counters these Techniques | | ------------------------- | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | +| [T0013 Create inauthentic websites](../generated_pages/techniques/T0013.md) | diff --git a/generated_pages/counters/C00174.md b/generated_pages/counters/C00174.md index caa4e0a..6b2827a 100644 --- a/generated_pages/counters/C00174.md +++ b/generated_pages/counters/C00174.md @@ -24,12 +24,10 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | diff --git a/generated_pages/counters/C00176.md b/generated_pages/counters/C00176.md index 0c0d990..397249d 100644 --- a/generated_pages/counters/C00176.md +++ b/generated_pages/counters/C00176.md @@ -23,36 +23,22 @@ | Counters these Techniques | | ------------------------- | -| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | -| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | -| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0043 Create personas](../generated_pages/techniques/T0043.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | -| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | -| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | -| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | -| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | -| [T0013 Develop New Narratives](../generated_pages/techniques/T0013.md) | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | +| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | +| [T0013 Create inauthentic websites](../generated_pages/techniques/T0013.md) | +| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | +| [T0015 Create hashtags and search artifacts](../generated_pages/techniques/T0015.md) | +| [T0016 Create Clickbait](../generated_pages/techniques/T0016.md) | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0043 Chat apps](../generated_pages/techniques/T0043.md) | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0061 Sell Merchandise](../generated_pages/techniques/T0061.md) | diff --git a/generated_pages/counters/C00178.md b/generated_pages/counters/C00178.md index 68a569f..feac876 100644 --- a/generated_pages/counters/C00178.md +++ b/generated_pages/counters/C00178.md @@ -23,10 +23,10 @@ | Counters these Techniques | | ------------------------- | -| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | -| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | -| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | +| [T0016 Create Clickbait](../generated_pages/techniques/T0016.md) | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | +| [T0020 Trial content](../generated_pages/techniques/T0020.md) | diff --git a/generated_pages/counters/C00182.md b/generated_pages/counters/C00182.md index 26e2467..b9a1e7b 100644 --- a/generated_pages/counters/C00182.md +++ b/generated_pages/counters/C00182.md @@ -24,8 +24,7 @@ | Counters these Techniques | | ------------------------- | -| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | +| [T0011 Compromise legitimate accounts](../generated_pages/techniques/T0011.md) | diff --git a/generated_pages/counters/C00184.md b/generated_pages/counters/C00184.md index a519418..29ac416 100644 --- a/generated_pages/counters/C00184.md +++ b/generated_pages/counters/C00184.md @@ -23,13 +23,10 @@ | Counters these Techniques | | ------------------------- | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | -| [T0041 Compromise legitimate accounts](../generated_pages/techniques/T0041.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | diff --git a/generated_pages/counters/C00188.md b/generated_pages/counters/C00188.md index a0a1f9e..9d975fb 100644 --- a/generated_pages/counters/C00188.md +++ b/generated_pages/counters/C00188.md @@ -25,15 +25,11 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | diff --git a/generated_pages/counters/C00189.md b/generated_pages/counters/C00189.md index 1b6f5d9..491d4b8 100644 --- a/generated_pages/counters/C00189.md +++ b/generated_pages/counters/C00189.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -23,11 +23,10 @@ | Counters these Techniques | | ------------------------- | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | -| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | -| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | +| [T0011 Compromise legitimate accounts](../generated_pages/techniques/T0011.md) | +| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | +| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | diff --git a/generated_pages/counters/C00190.md b/generated_pages/counters/C00190.md index 872b1fd..80c6436 100644 --- a/generated_pages/counters/C00190.md +++ b/generated_pages/counters/C00190.md @@ -24,12 +24,9 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | diff --git a/generated_pages/counters/C00195.md b/generated_pages/counters/C00195.md index bb4e8c6..2f32026 100644 --- a/generated_pages/counters/C00195.md +++ b/generated_pages/counters/C00195.md @@ -23,17 +23,12 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0016 Create Clickbait](../generated_pages/techniques/T0016.md) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | diff --git a/generated_pages/counters/C00197.md b/generated_pages/counters/C00197.md index ac73c21..6127f85 100644 --- a/generated_pages/counters/C00197.md +++ b/generated_pages/counters/C00197.md @@ -8,7 +8,7 @@ * **Resources needed:** R003 - money -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -25,9 +25,9 @@ | Counters these Techniques | | ------------------------- | -| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | +| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | +| [T0011 Compromise legitimate accounts](../generated_pages/techniques/T0011.md) | diff --git a/generated_pages/counters/C00200.md b/generated_pages/counters/C00200.md index 65d306a..c506f31 100644 --- a/generated_pages/counters/C00200.md +++ b/generated_pages/counters/C00200.md @@ -24,11 +24,9 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | diff --git a/generated_pages/counters/C00202.md b/generated_pages/counters/C00202.md index 3fbb373..5fb87b8 100644 --- a/generated_pages/counters/C00202.md +++ b/generated_pages/counters/C00202.md @@ -23,7 +23,6 @@ | Counters these Techniques | | ------------------------- | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | diff --git a/generated_pages/counters/C00203.md b/generated_pages/counters/C00203.md index 778d483..e50dfd2 100644 --- a/generated_pages/counters/C00203.md +++ b/generated_pages/counters/C00203.md @@ -8,7 +8,7 @@ * **Resources needed:** -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA15 | Actor types | Sectors | @@ -24,14 +24,9 @@ | Counters these Techniques | | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | diff --git a/generated_pages/counters/C00205.md b/generated_pages/counters/C00205.md index ddeb8ac..3f44ab8 100644 --- a/generated_pages/counters/C00205.md +++ b/generated_pages/counters/C00205.md @@ -25,11 +25,8 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | diff --git a/generated_pages/counters/C00211.md b/generated_pages/counters/C00211.md index 0dbfb08..ea95f7e 100644 --- a/generated_pages/counters/C00211.md +++ b/generated_pages/counters/C00211.md @@ -23,18 +23,10 @@ | Counters these Techniques | | ------------------------- | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0020 Trial content](../generated_pages/techniques/T0020.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | diff --git a/generated_pages/counters/C00212.md b/generated_pages/counters/C00212.md index faf5abe..c74e686 100644 --- a/generated_pages/counters/C00212.md +++ b/generated_pages/counters/C00212.md @@ -25,10 +25,9 @@ | Counters these Techniques | | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | diff --git a/generated_pages/counters/C00216.md b/generated_pages/counters/C00216.md index 66e67a1..b1c6dda 100644 --- a/generated_pages/counters/C00216.md +++ b/generated_pages/counters/C00216.md @@ -24,12 +24,12 @@ | Counters these Techniques | | ------------------------- | -| [T0014 Leverage Existing Narratives](../generated_pages/techniques/T0014.md) | -| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | -| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | -| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | +| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | +| [T0016 Create Clickbait](../generated_pages/techniques/T0016.md) | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | +| [T0061 Sell Merchandise](../generated_pages/techniques/T0061.md) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | diff --git a/generated_pages/counters/C00219.md b/generated_pages/counters/C00219.md index d2642cf..17f9e75 100644 --- a/generated_pages/counters/C00219.md +++ b/generated_pages/counters/C00219.md @@ -23,9 +23,6 @@ | Counters these Techniques | | ------------------------- | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | diff --git a/generated_pages/counters_index.md b/generated_pages/counters_index.md index d55f556..c3df912 100644 --- a/generated_pages/counters_index.md +++ b/generated_pages/counters_index.md @@ -184,7 +184,7 @@ This could be used to adjust upvote weight via a trust factor of people and orga Create more friction at account creation Counters fake account M004 - friction -TA03 Develop People +TA15 - Establish Social Assets D04 @@ -192,7 +192,7 @@ This could be used to adjust upvote weight via a trust factor of people and orga Infiltrate the in-group to discredit leaders (divide) All of these would be highly affected by infiltration or false-claims of infiltration. M013 - targeting -TA03 Develop People +TA15 - Establish Social Assets D02 @@ -200,7 +200,7 @@ This could be used to adjust upvote weight via a trust factor of people and orga third party verification for people counters fake experts M011 - verification -TA03 Develop People +TA15 - Establish Social Assets D02 @@ -208,7 +208,7 @@ This could be used to adjust upvote weight via a trust factor of people and orga Address truth contained in narratives Focus on and boost truths in misinformation narratives, removing misinformation from them. M010 - countermessaging -TA03 Develop People +TA15 Establish Social Assets D04 @@ -216,7 +216,7 @@ This could be used to adjust upvote weight via a trust factor of people and orga Keep people from posting to social media immediately Platforms can introduce friction to slow down activities, force a small delay between posts, or replies to posts. M004 - friction -TA03 Develop People +TA15 - Establish Social Assets D03 @@ -224,7 +224,7 @@ This could be used to adjust upvote weight via a trust factor of people and orga Marginalise and discredit extremist groups Reduce the credibility of extremist groups posting misinformation. M013 - targeting -TA03 Develop People +TA15 - Establish Social Assets D04 @@ -232,7 +232,7 @@ This could be used to adjust upvote weight via a trust factor of people and orga Honeypot with coordinated inauthentics Flood disinformation spaces with obviously fake content, to dilute core misinformation narratives in them. M008 - data pollution -TA04 Develop Networks +TA15 Establish Social Assets D05 @@ -240,7 +240,7 @@ This could be used to adjust upvote weight via a trust factor of people and orga Name and Shame Influencers Think about the different levels: individual vs state-sponsored account. Includes “call them out” and “name and shame”. Identify social media accounts as sources of propaganda—“calling them out”— might be helpful to prevent the spread of their message to audiences that otherwise would consider them factual. Identify, monitor, and, if necessary, target externally-based nonattributed social media accounts. Impact of and Dealing with Trolls - "Chatham House has observed that trolls also sometimes function as decoys, as a way of “keeping the infantry busy” that “aims to wear down the other side” (Lough et al., 2014). Another type of troll involves “false accounts posing as authoritative information sources on social media”. M003 - daylight -TA03 Develop People +TA15 - Establish Social Assets D07 @@ -248,7 +248,7 @@ This could be used to adjust upvote weight via a trust factor of people and orga Counter social engineering training Includes anti-elicitation training, phishing prevention education. M001 - resilience -TA03 Develop People +TA15 - Establish Social Assets D02 @@ -256,7 +256,7 @@ This could be used to adjust upvote weight via a trust factor of people and orga Infiltrate platforms Detect and degrade M013 - targeting -TA04 Develop Networks +TA15 Establish Social Assets D04 @@ -264,7 +264,7 @@ This could be used to adjust upvote weight via a trust factor of people and orga Delete old accounts / Remove unused social media accounts remove or remove access to (e.g. stop the ability to update) old social media accounts, to reduce the pool of accounts available for takeover, botnets etc. M012 - cleaning -TA04 Develop Networks +TA15 Establish Social Assets D04 @@ -272,7 +272,7 @@ This could be used to adjust upvote weight via a trust factor of people and orga Encourage people to leave social media Encourage people to leave spcial media. We don't expect this to work M004 - friction -TA04 Develop Networks +TA15 Establish Social Assets D02 @@ -280,7 +280,7 @@ This could be used to adjust upvote weight via a trust factor of people and orga Report crowdfunder as violator counters crowdfunding. Includes ‘Expose online funding as fake”. M005 - removal -TA03 Develop People +TA15 - Establish Social Assets D02 @@ -288,7 +288,7 @@ This could be used to adjust upvote weight via a trust factor of people and orga Verification of project before posting fund requests third-party verification of projects posting funding campaigns before those campaigns can be posted. M011 - verification -TA04 Develop Networks +TA15 Establish Social Assets D02 @@ -304,7 +304,7 @@ This could be used to adjust upvote weight via a trust factor of people and orga Free open library sources worldwide Open-source libraries could be created that aid in some way for each technique. Even for Strategic Planning, some open-source frameworks such as DISARM can be created to counter the adversarial efforts. M010 - countermessaging -TA04 Develop Networks +TA15 Establish Social Assets D04 @@ -328,7 +328,7 @@ This could be used to adjust upvote weight via a trust factor of people and orga Denigrate the recipient/ project (of online funding) Reduce the credibility of groups behind misinformation-linked funding campaigns. M013 - targeting -TA03 Develop People +TA15 Establish Social Assets D03 @@ -397,10 +397,10 @@ T0046 - Search Engine Optimization: Sub-optimal website performance affect its s C00077 -Active defence: run TA03 "develop people” - not recommended +Active defence: run TA15 "develop people” - not recommended Develop networks of communities and influencers around counter-misinformation. Match them to misinformation creators M013 - targeting -TA03 Develop People +TA15 - Establish Social Assets D03 @@ -498,7 +498,7 @@ Online archives of content (archives of websites, social media profiles, media, Influencer code of conduct Establish tailored code of conduct for individuals with many followers. Can be platform code of conduct; can also be community code. M001 - resilience -TA03 Develop People +TA15 - Establish Social Assets D07 @@ -762,7 +762,7 @@ Online archives of content (archives of websites, social media profiles, media, Deplatform Account* Note: Similar to Deplatform People but less generic. Perhaps both should be left. M005 - removal -TA03 Develop People +TA15 - Establish Social Assets D03 @@ -770,7 +770,7 @@ Online archives of content (archives of websites, social media profiles, media, Deplatform message groups and/or message boards Merged two rows here. M005 - removal -TA04 Develop Networks +TA15 Establish Social Assets D03 @@ -874,7 +874,7 @@ Online archives of content (archives of websites, social media profiles, media, Ban incident actors from funding sites Ban misinformation creators and posters from funding sites M005 - removal -TA03 Develop People +TA15 - Establish Social Assets D02 @@ -898,7 +898,7 @@ Online archives of content (archives of websites, social media profiles, media, find and train influencers Identify key influencers (e.g. use network analysis), then reach out to identified users and offer support, through either training or resources. M001 - resilience -TA03 Develop People +TA15 - Establish Social Assets D02 @@ -914,7 +914,7 @@ Online archives of content (archives of websites, social media profiles, media, Unravel/target the Potemkin villages Kremlin’s narrative spin extends through constellations of “civil society” organizations, political parties, churches, and other actors. Moscow leverages think tanks, human rights groups, election observers, Eurasianist integration groups, and orthodox groups. A collection of Russian civil society organizations, such as the Federal Agency for the Commonwealth of Independent States Affairs, Compatriots Living Abroad, and International Humanitarian Cooperation, together receive at least US$100 million per year, in addition to government-organized nongovernmental organizations (NGOs), at least 150 of which are funded by Russian presidential grants totaling US$70 million per year. M013 - targeting -TA04 Develop Networks +TA15 Establish Social Assets D03 @@ -954,7 +954,7 @@ Online archives of content (archives of websites, social media profiles, media, social media source removal Removing accounts, pages, groups, e.g. facebook page removal M005 - removal -TA04 Develop Networks +TA15 Establish Social Assets D02 @@ -1010,7 +1010,7 @@ Online archives of content (archives of websites, social media profiles, media, Ensure that platforms are taking down flagged accounts Use ongoing analysis/monitoring of "flagged" profiles. Confirm whether platforms are actively removing flagged accounts, and raise pressure via e.g. government organizations to encourage removal M003 - daylight -TA03 Develop People +TA15 - Establish Social Assets D06 @@ -1034,7 +1034,7 @@ Online archives of content (archives of websites, social media profiles, media, remove suspicious accounts Standard reporting for false profiles (identity issues). Includes detecting hijacked accounts and reallocating them - if possible, back to original owners. M005 - removal -TA03 Develop People +TA15 - Establish Social Assets D02 @@ -1058,7 +1058,7 @@ Online archives of content (archives of websites, social media profiles, media, Stop offering press credentials to propaganda outlets Remove access to official press events from known misinformation actors. M004 - friction -TA04 Develop Networks +TA15 Establish Social Assets D03 diff --git a/generated_pages/detections_index.md b/generated_pages/detections_index.md index 6e77624..ed1d0fd 100644 --- a/generated_pages/detections_index.md +++ b/generated_pages/detections_index.md @@ -70,7 +70,7 @@ Detect abnormal amplification -TA03 Develop People +TA15 Establish Social Assets D01 @@ -78,7 +78,7 @@ Detect abnormal events -TA03 Develop People +TA15 Establish Social Assets D01 @@ -86,7 +86,7 @@ Detect abnormal groups -TA03 Develop People +TA15 Establish Social Assets D01 @@ -94,7 +94,7 @@ Detect abnormal pages -TA03 Develop People +TA15 Establish Social Assets D01 @@ -102,7 +102,7 @@ Detect abnormal profiles, e.g. prolific pages/ groups/ people -TA03 Develop People +TA15 Establish Social Assets D01 @@ -110,7 +110,7 @@ Identify fake news sites -TA03 Develop People +TA15 Establish Social Assets D01 @@ -118,7 +118,7 @@ Trace connections for e.g. fake news sites -TA03 Develop People +TA15 Establish Social Assets D01 @@ -126,7 +126,7 @@ Detect anomalies in membership growth patterns I include Fake Experts as they may use funding campaigns such as Patreon to fund their operations and so these should be watched. -TA03 Develop People +TA15 Establish Social Assets D01 @@ -136,7 +136,7 @@ In TA08-11, the engagement level of victims could be identified to detect and respond to increasing engagement. -TA03 Develop People +TA15 Establish Social Assets D01 @@ -144,7 +144,7 @@ In TA08-11, the engagement level of victims could be identified to detect and re Measure emotional valence -TA03 Develop People +TA15 Establish Social Assets D01 @@ -152,7 +152,7 @@ In TA08-11, the engagement level of victims could be identified to detect and re Follow the money track funding sources -TA03 Develop People +TA15 Establish Social Assets D01 @@ -160,7 +160,7 @@ In TA08-11, the engagement level of victims could be identified to detect and re Activity resurgence detection (alarm when dormant accounts become activated) -TA04 Develop Networks +TA15 Establish Social Assets D01 @@ -168,7 +168,7 @@ In TA08-11, the engagement level of victims could be identified to detect and re Detect anomalous activity -TA04 Develop Networks +TA15 Establish Social Assets D01 @@ -176,7 +176,7 @@ In TA08-11, the engagement level of victims could be identified to detect and re AI/ML automated early detection of campaign planning -TA04 Develop Networks +TA15 Establish Social Assets D01 @@ -184,7 +184,7 @@ In TA08-11, the engagement level of victims could be identified to detect and re Digital authority - regulating body (united states) -TA04 Develop Networks +TA15 Establish Social Assets D01 @@ -192,7 +192,7 @@ In TA08-11, the engagement level of victims could be identified to detect and re Periodic verification (counter to hijack legitimate account) -TA04 Develop Networks +TA15 Establish Social Assets D01 @@ -200,7 +200,7 @@ In TA08-11, the engagement level of victims could be identified to detect and re Teach civics to kids/ adults/ seniors -TA04 Develop Networks +TA15 Establish Social Assets D01 @@ -629,7 +629,7 @@ For example, other ways of deplatforming people include attacking their sources Model for bot account behavior Bot account: action based, people. Unsure which DISARM techniques. -TA03 Develop People +TA15 - Establish Social Assets D01 @@ -637,7 +637,7 @@ For example, other ways of deplatforming people include attacking their sources Monitor account level activity in social networks All techniques benefit from careful analysis and monitoring of activities on social network. -TA03 Develop People +TA15 - Establish Social Assets D01 @@ -685,7 +685,7 @@ For example, other ways of deplatforming people include attacking their sources Track individual bad actors -TA03 Develop People +TA15 - Establish Social Assets D01 @@ -728,7 +728,7 @@ Intent: judgement of adversarial intent to conduct gray zone activity. Indeed, t target/name/flag "grey zone" website content "Gray zone" is second level of content producers and circulators, composed of outlets with uncertain attribution. This category covers conspiracy websites, far-right or far-left websites, news aggregators, and data dump websites -TA04 Develop Networks +TA15 Establish Social Assets D01 @@ -760,7 +760,7 @@ Intent: judgement of adversarial intent to conduct gray zone activity. Indeed, t S4d detection and re-allocation approaches S4D is a way to separate out different speakers in text, audio. M004 - friction -TA03 Develop People +TA15 - Establish Social Assets D01 diff --git a/generated_pages/disarm_blue_framework.md b/generated_pages/disarm_blue_framework.md index 7a2293a..4f31824 100644 --- a/generated_pages/disarm_blue_framework.md +++ b/generated_pages/disarm_blue_framework.md @@ -5,26 +5,24 @@ TA01 Plan Strategy TA02 Plan Objectives -TA03 Target Audience Analysis -TA04 Develop Narratives -TA05 Develop Content -TA06 Establish Social Assets -TA07 Establish Legitimacy -TA08 Microtarget -TA09 Select Channels and Affordances -TA10 Conduct Pump Priming -TA11 Deliver Content -TA12 Maximize Exposure -TA13 Drive Online Harms -TA14 Drive Offline Activity -TA15 Persist in the Information Environment -TA16 Assess Effectiveness +TA05 Microtarget +TA06 Develop Content +TA07 Select Channels and Affordances +TA08 Conduct Pump Priming +TA09 Deliver Content +TA10 Drive Offline Activity +TA11 Persist in the Information Environment +TA12 Assess Effectiveness +TA13 Target Audience Analysis +TA14 Develop Narratives +TA15 Establish Social Assets +TA16 Establish Legitimacy +TA17 Maximize Exposure +TA18 Drive Online Harms C00006 Charge for social media C00009 Educate high profile influencers on best practices -C00034 Create more friction at account creation -C00047 Honeypot with coordinated inauthentics C00065 Reduce political targeting C00014 Real-time updates to fact-checking database C00090 Fake engagement system @@ -35,14 +33,14 @@ C00140 "Bomb" link shorteners with lots of calls +C00034 Create more friction at account creation + C00008 Create shared fact-checking database C00011 Media literacy. Games to identify fake news -C00036 Infiltrate the in-group to discredit leaders (divide) -C00052 Infiltrate platforms C00066 Co-opt a hashtag and drown it out (hijack it back) C00032 Hijack content and link to truth- based info C00097 Require use of verified identities to contribute to poll or comment @@ -53,14 +51,14 @@ C00148 Add random links to network graphs +C00036 Infiltrate the in-group to discredit leaders (divide) + C00010 Enhanced privacy regulation for social media C00028 Make information provenance available -C00040 third party verification for people -C00053 Delete old accounts / Remove unused social media accounts C00130 Mentorship: elders, youth, credit. Learn vicariously. C00071 Block source of pollution C00098 Revocation of allowlisted or "verified" status @@ -71,14 +69,14 @@ C00149 Poison the monitoring & evaluation data +C00040 third party verification for people + C00012 Platform regulation C00029 Create fake website to issue counter narrative and counter narrative through physical merchandise -C00042 Address truth contained in narratives -C00056 Encourage people to leave social media C00178 Fill information voids with non-disinformation content C00072 Remove non-relevant content from special interest groups - not recommended C00099 Strengthen verification methods @@ -89,14 +87,14 @@ +C00042 Address truth contained in narratives + C00013 Rating framework for news C00030 Develop a compelling counter narrative (truth based) -C00044 Keep people from posting to social media immediately -C00059 Verification of project before posting fund requests C00216 Use advertiser controls to stem flow of funds to bad actors C00074 Identify and delete or rate limit identical content C00101 Create friction by rate-limiting engagement @@ -107,14 +105,14 @@ +C00044 Keep people from posting to social media immediately + C00016 Censorship C00031 Dilute the core narrative - create multiple permutations, target / amplify -C00046 Marginalise and discredit extremist groups -C00062 Free open library sources worldwide C00075 normalise language C00103 Create a bot that engages / distract trolls @@ -125,14 +123,14 @@ +C00046 Marginalise and discredit extremist groups + C00017 Repair broken social connections C00060 Legal action against for-profit engagement factories -C00048 Name and Shame Influencers -C00135 Deplatform message groups and/or message boards C00076 Prohibit images in political discourse channels C00105 Buy more advertising than misinformation creators @@ -143,14 +141,14 @@ +C00047 Honeypot with coordinated inauthentics + C00019 Reduce effect of division-enablers C00070 Block access to disinformation resources -C00051 Counter social engineering training -C00162 Unravel/target the Potemkin villages C00078 Change Search Algorithms for Disinformation Content C00195 Redirect searches away from disinformation or extremist content @@ -161,14 +159,14 @@ +C00048 Name and Shame Influencers + C00021 Encourage in-person communication C00092 Establish a truth teller reputation score for influencers -C00058 Report crowdfunder as violator -C00172 social media source removal C00080 Create competing narrative @@ -179,14 +177,14 @@ +C00051 Counter social engineering training + C00022 Innoculate. Positive campaign to promote feeling of safety C00144 Buy out troll farm employees / offer them jobs -C00067 Denigrate the recipient/ project (of online funding) -C00203 Stop offering press credentials to propaganda outlets C00081 Highlight flooding and noise, and explain motivations @@ -197,14 +195,14 @@ +C00052 Infiltrate platforms + C00024 Promote healthy narratives C00156 Better tell your country or organization story -C00077 Active defence: run TA03 "develop people” - not recommended - C00082 Ground truthing as automated response to pollution @@ -215,14 +213,14 @@ +C00053 Delete old accounts / Remove unused social media accounts + C00026 Shore up democracy based messages C00164 compatriot policy -C00093 Influencer code of conduct - C00084 Modify disinformation narratives, and rebroadcast them @@ -233,14 +231,14 @@ +C00056 Encourage people to leave social media + C00027 Create culture of civility C00169 develop a creative content hub -C00133 Deplatform Account* - C00085 Mute content @@ -251,14 +249,14 @@ +C00058 Report crowdfunder as violator + C00073 Inoculate populations through media literacy training C00207 Run a competing disinformation campaign - not recommended -C00155 Ban incident actors from funding sites - C00086 Distract from noise with addictive content @@ -269,14 +267,14 @@ +C00059 Verification of project before posting fund requests + C00096 Strengthen institutions that are always truth tellers C00222 Tabletop simulations -C00160 find and train influencers - C00087 Make more noise than the disinformation @@ -287,14 +285,14 @@ +C00062 Free open library sources worldwide + C00111 Reduce polarisation by connecting and presenting sympathetic renditions of opposite views -C00189 Ensure that platforms are taking down flagged accounts - C00091 Honeypot social community @@ -305,14 +303,14 @@ +C00067 Denigrate the recipient/ project (of online funding) + C00153 Take pre-emptive action against actors' infrastructure -C00197 remove suspicious accounts - C00094 Force full disclosure on corporate sponsor of research @@ -323,6 +321,8 @@ +C00077 Active defence: run TA15 "develop people” - not recommended + @@ -330,8 +330,6 @@ C00159 Have a disinformation response plan - - C00106 Click-bait centrist content @@ -341,6 +339,8 @@ +C00093 Influencer code of conduct + @@ -348,8 +348,6 @@ C00161 Coalition Building with stakeholders and Third-Party Inducements - - C00107 Content moderation @@ -359,6 +357,8 @@ +C00133 Deplatform Account* + @@ -366,8 +366,6 @@ C00170 elevate information as a critical domain of statecraft - - C00142 Platform adds warning label and decision point when sharing content @@ -377,6 +375,8 @@ +C00135 Deplatform message groups and/or message boards + @@ -384,8 +384,6 @@ C00174 Create a healthier news environment - - C00165 Ensure integrity of official documents @@ -395,6 +393,8 @@ +C00155 Ban incident actors from funding sites + @@ -402,8 +402,6 @@ C00176 Improve Coordination amongst stakeholders: public and private - - C00202 Set data 'honeytraps' @@ -413,6 +411,8 @@ +C00160 find and train influencers + @@ -420,8 +420,6 @@ C00190 open engagement with civil society - - C00219 Add metadata to content that’s out of the control of disinformation creators @@ -431,6 +429,8 @@ +C00162 Unravel/target the Potemkin villages + @@ -447,7 +447,7 @@ - +C00172 social media source removal @@ -465,7 +465,7 @@ - +C00189 Ensure that platforms are taking down flagged accounts @@ -483,7 +483,7 @@ - +C00197 remove suspicious accounts @@ -501,7 +501,7 @@ - +C00203 Stop offering press credentials to propaganda outlets diff --git a/generated_pages/disarm_red_framework.md b/generated_pages/disarm_red_framework.md index c85851b..99075aa 100644 --- a/generated_pages/disarm_red_framework.md +++ b/generated_pages/disarm_red_framework.md @@ -5,157 +5,189 @@ TA01 Plan Strategy TA02 Plan Objectives -TA03 Target Audience Analysis -TA04 Develop Narratives -TA05 Develop Content -TA06 Establish Social Assets -TA07 Establish Legitimacy -TA08 Microtarget -TA09 Select Channels and Affordances -TA10 Conduct Pump Priming -TA11 Deliver Content -TA12 Maximize Exposure -TA13 Drive Online Harms -TA14 Drive Offline Activity -TA15 Persist in the Information Environment -TA16 Assess Effectiveness +TA05 Microtarget +TA06 Develop Content +TA07 Select Channels and Affordances +TA08 Conduct Pump Priming +TA09 Deliver Content +TA10 Drive Offline Activity +TA11 Persist in the Information Environment +TA12 Assess Effectiveness +TA13 Target Audience Analysis +TA14 Develop Narratives +TA15 Establish Social Assets +TA16 Establish Legitimacy +TA17 Maximize Exposure +TA18 Drive Online Harms -T0001 Determine Target Audiences -T0003 Dismiss -T0010 Map Target Audience Information Environment -T0013 Develop New Narratives -T0020 Reuse Existing Content -T0029 Create Inauthentic Accounts -T0041 Compromise legitimate accounts -T0047 Create Clickbait -T0051 Chat apps -T0063 Trial content -T0070 Deliver Ads -T0074 Flooding the Information Space -T0080 Harass -T0085 Encourage Attendance at Events -T0090 Conceal People -T0095 Measure Performance +T0073 Determine Target Audiences +T0002 Facilitate State Propaganda +T0016 Create Clickbait +T0015 Create hashtags and search artifacts +T0029 Online polls +T0020 Trial content +T0114 Deliver Ads +T0017 Conduct fundraising +T0059 Play the long game +T0132 Measure Performance +T0072 Segment Audiences +T0003 Leverage Existing Narratives +T0007 Create Inauthentic Social Media Pages and Groups +T0009 Create fake experts +T0049 Flooding the Information Space +T0047 Censor social media as a political force -T0002 Determine Strategic Ends -T0004 Distort -T0011 Identify Social and Technical Vulnerabilities -T0014 Leverage Existing Narratives -T0021 Develop Text-based Content -T0030 Recruit bad actors -T0042 Create fake experts -T0048 Purchase Targeted Advertisements -T0052 Livestream -T0064 Bait legitimate influencers -T0071 Post Content -T0075 Amplify Existing Narrative -T0081 Censor social media as a political force -T0086 Organize Events -T0091 Conceal Operational Activity -T0096 Measure Effectiveness +T0074 Determine Strategic Ends +T0066 Degrade Adversary +T0018 Purchase Targeted Advertisements +T0019 Generate information pollution +T0043 Chat apps +T0039 Bait legitimate influencers +T0115 Post Content +T0057 Organize Events +T0060 Continue to Amplify +T0133 Measure Effectiveness +T0080 Map Target Audience Information Environment +T0004 Develop Competing Narratives +T0010 Cultivate ignorant agents +T0011 Compromise legitimate accounts +T0118 Amplify Existing Narrative +T0048 Harass -T0005 Distract -T0012 Segment Audiences -T0015 Develop Competing Narratives -T0022 Develop Image-based Content -T0031 Cultivate ignorant agents -T0043 Create personas -T0049 Create Localized Content -T0053 Social Networks -T0065 Seed Kernel of truth -T0072 Comment or Reply on Content -T0076 Cross-Posting -T0082 Control Information Environment through Offensive Cyberspace Operations -T0087 Conduct fundraising -T0092 Conceal Infrastructure -T0097 Measure Effectiveness Indicators (or KPIs) +T0075 Dismiss +T0101 Create Localized Content +T0023 Distort facts +T0103 Livestream +T0042 Seed Kernel of truth +T0116 Comment or Reply on Content +T0061 Sell Merchandise +T0128 Conceal People +T0134 Measure Effectiveness Indicators (or KPIs) +T0081 Identify Social and Technical Vulnerabilities +T0022 Leverage Conspiracy Theory Narratives +T0013 Create inauthentic websites +T0097 Create personas +T0119 Cross-Posting +T0123 Control Information Environment through Offensive Cyberspace Operations -T0006 Dismay +T0076 Distort +T0102 Leverage Echo Chambers/Filter Bubbles +T0084 Reuse Existing Content +T0104 Social Networks +T0044 Seed distortions +T0117 Attract Traditional Media +T0126 Encourage Attendance at Events +T0129 Conceal Operational Activity -T0016 Leverage Conspiracy Theory Narratives -T0023 Develop Video-based Content -T0032 Build Network -T0044 Establish Inauthentic News Sites -T0050 Leverage Echo Chambers/Filter Bubbles -T0054 Media Sharing Networks -T0066 Seed distortions -T0073 Attract Traditional Media -T0077 Incentivize Sharing -T0083 Suppress Opposition -T0088 Physical Violence -T0093 Exploit TOS/Content Moderation + +T0040 Demand insurmountable proof +T0014 Prepare fundraising campaigns +T0098 Establish Inauthentic News Sites +T0120 Incentivize Sharing +T0124 Suppress Opposition + + + +T0077 Distract + +T0085 Develop Text-based Content +T0105 Media Sharing Networks +T0045 Use fake experts + +T0127 Physical Violence +T0130 Conceal Infrastructure + + +T0068 Respond to Breaking News Event or Active Crisis +T0065 Prepare Physical Broadcast Capabilities +T0099 Prepare Assets Impersonating Legitimate Entities +T0121 Manipulate Platform Algorithm +T0125 Platform Filtering + + + +T0078 Dismay + +T0086 Develop Image-based Content +T0106 Discussion Forums +T0046 Use Search Engine Optimization + + +T0131 Exploit TOS/Content Moderation + + +T0082 Develop New Narratives +T0090 Create Inauthentic Accounts +T0100 Co-opt Trusted Sources +T0122 Direct Users to Alternative Platforms -T0007 Divide +T0079 Divide -T0017 Integrate Target Audience Vulnerabilities into Narrative -T0024 Develop Audio-based Content -T0033 Acquire/ recruit Network -T0045 Prepare Assets Impersonating Legitimate Entities +T0087 Develop Video-based Content +T0107 Bookmarking and Content Curation +T0113 Employ Commercial Analytic Firms -T0055 Discussion Forums -T0067 Use fake experts -T0078 Manipulate Platform Algorithm -T0084 Platform Filtering -T0089 Merchandising/ Advertising -T0094 Play the long game - - -T0008 Degrade Adversary - -T0018 Respond to Breaking News Event or Active Crisis -T0025 Generate information pollution -T0034 Infiltrate Existing Networks -T0046 Co-opt Trusted Sources - -T0056 Bookmarking and Content Curation -T0068 Use Search Engine Optimization - -T0079 Direct Users to Alternative Platforms +T0083 Integrate Target Audience Vulnerabilities into Narrative +T0091 Recruit bad actors -T0009 Facilitate State Propaganda - -T0019 Demand insurmountable proof -T0026 Distort facts -T0035 Create Inauthentic Social Media Pages and Groups -T0057 Blogging and Publishing Networks -T0069 Employ Commercial Analytic Firms +T0088 Develop Audio-based Content +T0108 Blogging and Publishing Networks + +T0092 Build Network + + + + + + + + +T0089 Obtain Private Documents +T0109 Consumer Review Networks + + + + + + + +T0093 Acquire/ recruit Network + + + -T0027 Create hashtags and search artifacts -T0036 Create inauthentic websites - - -T0058 Consumer Review Networks +T0110 Formal Diplomatic Channels @@ -163,17 +195,17 @@ +T0094 Infiltrate Existing Networks + + + -T0028 Obtain Private Documents -T0037 Prepare Physical Broadcast Capabilities - - -T0059 Online polls +T0111 Traditional Media @@ -181,17 +213,17 @@ +T0095 Develop Owned Media Assets + + + - -T0038 Develop Owned Media Assets - - -T0060 Formal Diplomatic Channels +T0112 Email @@ -199,39 +231,7 @@ - - - - - - - -T0039 Prepare fundraising campaigns - - -T0061 Traditional Media - - - - - - - - - - - - - - -T0040 Leverage Content Farm - - -T0062 Email - - - - +T0096 Leverage Content Farm diff --git a/generated_pages/incidents/I00002.md b/generated_pages/incidents/I00002.md index d9db342..77b6658 100644 --- a/generated_pages/incidents/I00002.md +++ b/generated_pages/incidents/I00002.md @@ -15,13 +15,10 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0017 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0017.md) | IT00000002 Promote "funding" campaign | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | IT00000001 buy FB targeted ads | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000003 create web-site - information pollution | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000005 SEO optimisation/manipulation ("key words") | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000004 create web-site - information pollution | -| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | IT00000006 legacy web content | -| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | IT00000007 hard to remove content and/or campaign/exploit TOS | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | IT00000002 Promote "funding" campaign | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | IT00000001 buy FB targeted ads | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000003 create web-site - information pollution | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000005 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00005.md b/generated_pages/incidents/I00005.md index d1f589e..776d9b4 100644 --- a/generated_pages/incidents/I00005.md +++ b/generated_pages/incidents/I00005.md @@ -24,23 +24,13 @@ The report adds that although officially the Russian government asserted its neu | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | IT00000011 Fake FB groups + dark content | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000016 cultivate, manipulate, exploit useful idiots | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | IT00000010 Targeted FB paid ads | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000014 RT & Sputnik generate information pollution | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | IT00000023 Memes... anti-immigration; euroskepticism; fear, outrage, conspiracy narratives | -| [T0029 Create Inauthentic Accounts](../generated_pages/techniques/T0029.md) | IT00000013 manipulate social media "online polls"? | -| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | IT00000024 Backstop personas | -| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000017 YouTube; Reddit; LinkedIn; Pinterest; WhatsApp? | -| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000018 YouTube; Reddit; LinkedIn; Pinterest; WhatsApp? | -| [T0034 Infiltrate Existing Networks](../generated_pages/techniques/T0034.md) | IT00000019 YouTube; Reddit; LinkedIn; Pinterest; WhatsApp? | -| [T0035 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0035.md) | IT00000020 YouTube; Reddit; LinkedIn; Pinterest; WhatsApp? | -| [T0036 Create inauthentic websites](../generated_pages/techniques/T0036.md) | IT00000021 YouTube; Reddit; LinkedIn; Pinterest; WhatsApp? | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000022 SEO optimisation/manipulation ("key words") | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000009 Twitter trolls amplify & manipulate | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000008 Twitter bots amplify & manipulate | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000015 RT & Sputnik generate information pollution | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | IT00000012 Digital to physical "organize+promote" rallies & events? | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | IT00000011 Fake FB groups + dark content | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000016 cultivate, manipulate, exploit useful idiots | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | IT00000010 Targeted FB paid ads | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000014 RT & Sputnik generate information pollution | +| [T0029 Online polls](../generated_pages/techniques/T0029.md) | IT00000013 manipulate social media "online polls"? | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000022 SEO optimisation/manipulation ("key words") | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | IT00000012 Digital to physical "organize+promote" rallies & events? | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00006.md b/generated_pages/incidents/I00006.md index a8b1d98..977537c 100644 --- a/generated_pages/incidents/I00006.md +++ b/generated_pages/incidents/I00006.md @@ -15,12 +15,9 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | IT00000029 Fake twitter profiles to amplify | -| [T0015 Develop Competing Narratives](../generated_pages/techniques/T0015.md) | IT00000027 Create and use hashtag | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | IT00000026 Fake video/images | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | IT00000030 bait journalists/media/politicians | -| [T0043 Create personas](../generated_pages/techniques/T0043.md) | IT00000025 Use SMS/text messages | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | IT00000028 Create and use hashtag | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | IT00000029 Fake twitter profiles to amplify | +| [T0015 Create hashtags and search artifacts](../generated_pages/techniques/T0015.md) | IT00000027 Create and use hashtag | +| [T0043 Chat apps](../generated_pages/techniques/T0043.md) | IT00000025 Use SMS/text messages | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00007.md b/generated_pages/incidents/I00007.md index 1888c89..ed506a9 100644 --- a/generated_pages/incidents/I00007.md +++ b/generated_pages/incidents/I00007.md @@ -15,11 +15,8 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000033 cultivate, manipulate, exploit useful idiots (in the case Paul Manafort) | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000031 RT & Sputnik generate information pollution (report an unreported false story/event) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000035 Twitter trolls amplify & manipulate | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000034 Twitter bots amplify & manipulate | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000032 RT & Sputnik generate information pollution (report an unreported false story/event) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000033 cultivate, manipulate, exploit useful idiots (in the case Paul Manafort) | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000031 RT & Sputnik generate information pollution (report an unreported false story/event) | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00009.md b/generated_pages/incidents/I00009.md index 7120e87..88d1b27 100644 --- a/generated_pages/incidents/I00009.md +++ b/generated_pages/incidents/I00009.md @@ -15,11 +15,9 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | IT00000039 FB pages | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000037 RT & Sputnik generate information pollution | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | IT00000036 Using "expert" | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | IT00000040 News circulated/amplifed by tertiary sites (Russia Insider, The Duran, Geopolitica.ru, Mint Press News, Oriental Review, globalresearch.ca) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000038 RT & Sputnik generate information pollution | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | IT00000039 FB pages | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000037 RT & Sputnik generate information pollution | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | IT00000036 Using "expert" | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00010.md b/generated_pages/incidents/I00010.md index e44642b..d209019 100644 --- a/generated_pages/incidents/I00010.md +++ b/generated_pages/incidents/I00010.md @@ -15,15 +15,10 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | IT00000045 FB pages/groups/profiles | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000044 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories; false flags, crisis actors) | -| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | IT00000048 4Chan/8Chan - trial content | -| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000046 YouTube; Reddit | -| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000047 YouTube; Reddit | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | IT00000049 journalist/media baiting | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000043 SEO optimisation/manipulation ("key words") | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000042 Twitter trolls amplify & manipulate | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000041 Twitter bots amplify & manipulate | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | IT00000045 FB pages/groups/profiles | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000044 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories; false flags, crisis actors) | +| [T0020 Trial content](../generated_pages/techniques/T0020.md) | IT00000048 4Chan/8Chan - trial content | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000043 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00015.md b/generated_pages/incidents/I00015.md index cc4fd49..a5daf88 100644 --- a/generated_pages/incidents/I00015.md +++ b/generated_pages/incidents/I00015.md @@ -15,10 +15,7 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | IT00000050 Forge ('release' altered hacked documents) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | IT00000051 hack/leak/manipulate/distort | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | IT00000053 journalist/media baiting | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | IT00000052 Circulate to media via DM, then release publicly | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | IT00000052 Circulate to media via DM, then release publicly | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00017.md b/generated_pages/incidents/I00017.md index d5855ea..ff4987a 100644 --- a/generated_pages/incidents/I00017.md +++ b/generated_pages/incidents/I00017.md @@ -15,27 +15,15 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | IT00000058 Fake FB groups + dark content | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000063 cultivate, manipulate, exploit useful idiots | -| [T0016 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0016.md) | IT00000073 Click-bait (economic actors) fake news sites (ie: Denver Guardian; Macedonian teens) | -| [T0018 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0018.md) | IT00000057 Targeted FB paid ads | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000061 RT & Sputnik generate information pollution | -| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | IT00000070 4Chan/8Chan - trial content | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | IT00000072 Memes... anti-immigration; euroskepticism; fear, outrage, conspiracy narratives | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | IT00000054 hack/leak/manipulate/distort | -| [T0029 Create Inauthentic Accounts](../generated_pages/techniques/T0029.md) | IT00000060 manipulate social media "online polls"? | -| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | IT00000074 Backstop personas | -| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000064 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000065 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0033 Acquire/ recruit Network](../generated_pages/techniques/T0033.md) | IT00000066 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0034 Infiltrate Existing Networks](../generated_pages/techniques/T0034.md) | IT00000067 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0035 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0035.md) | IT00000068 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0036 Create inauthentic websites](../generated_pages/techniques/T0036.md) | IT00000069 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000071 SEO optimisation/manipulation ("key words") | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000056 Twitter trolls amplify & manipulate | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000055 Twitter bots amplify & manipulate | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000062 RT & Sputnik generate information pollution | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | IT00000059 Digital to physical "organize+promote" rallies & events | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | IT00000058 Fake FB groups + dark content | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000063 cultivate, manipulate, exploit useful idiots | +| [T0016 Create Clickbait](../generated_pages/techniques/T0016.md) | IT00000073 Click-bait (economic actors) fake news sites (ie: Denver Guardian; Macedonian teens) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | IT00000057 Targeted FB paid ads | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000061 RT & Sputnik generate information pollution | +| [T0020 Trial content](../generated_pages/techniques/T0020.md) | IT00000070 4Chan/8Chan - trial content | +| [T0029 Online polls](../generated_pages/techniques/T0029.md) | IT00000060 manipulate social media "online polls"? | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000071 SEO optimisation/manipulation ("key words") | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | IT00000059 Digital to physical "organize+promote" rallies & events | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00022.md b/generated_pages/incidents/I00022.md index 89d03d1..5f9eb58 100644 --- a/generated_pages/incidents/I00022.md +++ b/generated_pages/incidents/I00022.md @@ -15,10 +15,7 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | IT00000078 Fake FB groups/pages/profiles + dark content | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | IT00000075 hack/leak/manipulate/distort | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000077 Twitter trolls amplify & manipulate | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000076 Twitter bots amplify & manipulate | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | IT00000078 Fake FB groups/pages/profiles + dark content | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00029.md b/generated_pages/incidents/I00029.md index 708892f..3eda445 100644 --- a/generated_pages/incidents/I00029.md +++ b/generated_pages/incidents/I00029.md @@ -15,17 +15,10 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | IT00000081 4 D's (dismiss, distort, distract, dismay...Official channels ie: Embassies & Defence Ministry; TASS | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000084 cultivate, manipulate, exploit useful idiots | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000082 RT & Sputnik generate information pollution (synthetic media) | -| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000087 YouTube; Reddit; | -| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000088 YouTube; Reddit; | -| [T0040 Leverage Content Farm](../generated_pages/techniques/T0040.md) | IT00000089 Demand insurmountable proof | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000085 SEO optimisation/manipulation ("key words") | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | IT00000086 News circulated/amplifed by tertiary sites (Russia Insider, The Duran, Geopolitica.ru, Mint Press News, Oriental Review, globalresearch.ca) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000080 Twitter trolls amplify & manipulate | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000079 Twitter bots amplify & manipulate | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000083 RT & Sputnik generate information pollution (synthetic media) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000084 cultivate, manipulate, exploit useful idiots | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000082 RT & Sputnik generate information pollution (synthetic media) | +| [T0040 Demand insurmountable proof](../generated_pages/techniques/T0040.md) | IT00000089 Demand insurmountable proof | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000085 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00032.md b/generated_pages/incidents/I00032.md index aaeb18c..58151fd 100644 --- a/generated_pages/incidents/I00032.md +++ b/generated_pages/incidents/I00032.md @@ -15,21 +15,12 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | IT00000092 Fake FB groups/pages/profiles | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000104 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories) | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000094 RT & Sputnik generate information pollution | -| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | IT00000102 4Chan/8Chan - trial content | -| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000096 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000097 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0033 Acquire/ recruit Network](../generated_pages/techniques/T0033.md) | IT00000098 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0034 Infiltrate Existing Networks](../generated_pages/techniques/T0034.md) | IT00000099 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0035 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0035.md) | IT00000100 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0036 Create inauthentic websites](../generated_pages/techniques/T0036.md) | IT00000101 YouTube; Reddit; (Instagram, LinkedIn; Pinterest; WhatsApp?) | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000103 SEO optimisation/manipulation ("key words") | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000091 Twitter trolls amplify & manipulate | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000090 Twitter bots amplify & manipulate | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000095 RT & Sputnik generate information pollution | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | IT00000093 Digital to physical "organize+promote" rallies & events? | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | IT00000092 Fake FB groups/pages/profiles | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000104 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories) | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000094 RT & Sputnik generate information pollution | +| [T0020 Trial content](../generated_pages/techniques/T0020.md) | IT00000102 4Chan/8Chan - trial content | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000103 SEO optimisation/manipulation ("key words") | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | IT00000093 Digital to physical "organize+promote" rallies & events? | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00033.md b/generated_pages/incidents/I00033.md index 3a95437..4d0cedd 100644 --- a/generated_pages/incidents/I00033.md +++ b/generated_pages/incidents/I00033.md @@ -15,12 +15,10 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | IT00000110 facilitate state propaganda and defuse crises | -| [T0047 Create Clickbait](../generated_pages/techniques/T0047.md) | IT00000108 cow online opinion leaders into submission, muzzling social media as a political force | -| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | IT00000109 cow online opinion leaders into submission, muzzling social media as a political force | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | IT00000105 2,000,000 people (est.) part of state run/sponsored astroturfing | -| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | IT00000107 domestic social media influence operations focus primarily on “cheerleading” or presenting or furthering a positive narrative about the Chinese state | -| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | IT00000106 fabricated social media comment | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | IT00000110 facilitate state propaganda and defuse crises | +| [T0047 Censor social media as a political force](../generated_pages/techniques/T0047.md) | IT00000108 cow online opinion leaders into submission, muzzling social media as a political force | +| [T0048 Harass](../generated_pages/techniques/T0048.md) | IT00000109 cow online opinion leaders into submission, muzzling social media as a political force | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | IT00000105 2,000,000 people (est.) part of state run/sponsored astroturfing | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00034.md b/generated_pages/incidents/I00034.md index 6938ecf..f0ba4e8 100644 --- a/generated_pages/incidents/I00034.md +++ b/generated_pages/incidents/I00034.md @@ -17,9 +17,9 @@ Unique for taking place outside of the Chinese Internet system, both transgressi | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | IT00000111 Netizens from one of the largest discussion forums in China, known as Diba, coordinated to overcome China’s Great Firewall | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | IT00000112 flood the Facebook pages of Taiwanese politicians and news agencies with a pro-PRC message | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | IT00000113 Democratic Progressive Party (DPP), attracted nearly 40,000 Facebook comments in just eight hours. | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | IT00000111 Netizens from one of the largest discussion forums in China, known as Diba, coordinated to overcome China’s Great Firewall | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | IT00000112 flood the Facebook pages of Taiwanese politicians and news agencies with a pro-PRC message | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | IT00000113 Democratic Progressive Party (DPP), attracted nearly 40,000 Facebook comments in just eight hours. | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00042.md b/generated_pages/incidents/I00042.md index f1c8ff9..ae2d768 100644 --- a/generated_pages/incidents/I00042.md +++ b/generated_pages/incidents/I00042.md @@ -15,10 +15,7 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0011 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0011.md) | IT00000114 “hack” of Qatar’s official news agency | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | IT00000117 memes | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | IT00000116 photoshopped/fake images | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000115 Twitter bots amplify & manipulate | +| [T0011 Compromise legitimate accounts](../generated_pages/techniques/T0011.md) | IT00000114 “hack” of Qatar’s official news agency | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00044.md b/generated_pages/incidents/I00044.md index abebc58..bf18287 100644 --- a/generated_pages/incidents/I00044.md +++ b/generated_pages/incidents/I00044.md @@ -15,16 +15,11 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | IT00000127 Promote fake “experts” with impressive (and scary) titles | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000126 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories) | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000120 RT & Sputnik generate information pollution | -| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | IT00000124 4Chan/8Chan - trial content | -| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000122 YouTube; Reddit | -| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000123 YouTube; Reddit | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000125 SEO optimisation/manipulation ("key words") | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000119 Twitter trolls amplify & manipulate | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000118 Twitter bots amplify & manipulate | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000121 RT & Sputnik generate information pollution | +| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | IT00000127 Promote fake “experts” with impressive (and scary) titles | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000126 cultivate, manipulate, exploit useful idiots (Alex Jones... drives conspiracy theories) | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000120 RT & Sputnik generate information pollution | +| [T0020 Trial content](../generated_pages/techniques/T0020.md) | IT00000124 4Chan/8Chan - trial content | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000125 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00047.md b/generated_pages/incidents/I00047.md index b2cfb05..bf5e150 100644 --- a/generated_pages/incidents/I00047.md +++ b/generated_pages/incidents/I00047.md @@ -16,12 +16,8 @@ The Russian Federal Security Service (FSB), which is also responsible for border | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | IT00000128 4 D's (dismiss, distort, distract, dismay...Official channels ie: Embassies & Defence Ministry; TASS | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | IT00000129 Russian FSB security service blamed Ukraine for sparking the clashes, saying their "irrefutable" evidence would "soon be made public | -| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | IT00000130 (Distort) Kremlin-controlled RT cited Russian Minister of Foreign Affairs Sergei Lavrov suggesting that Ukraine deliberately provoked Russia in hopes of gaining additional support from the United States and Europe. | -| [T0040 Leverage Content Farm](../generated_pages/techniques/T0040.md) | IT00000133 Demand insurmountable proof | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000132 Twitter trolls amplify & manipulate | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000131 Twitter bots amplify & manipulate | +| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | IT00000130 (Distort) Kremlin-controlled RT cited Russian Minister of Foreign Affairs Sergei Lavrov suggesting that Ukraine deliberately provoked Russia in hopes of gaining additional support from the United States and Europe. | +| [T0040 Demand insurmountable proof](../generated_pages/techniques/T0040.md) | IT00000133 Demand insurmountable proof | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00049.md b/generated_pages/incidents/I00049.md index 86d7514..e48a006 100644 --- a/generated_pages/incidents/I00049.md +++ b/generated_pages/incidents/I00049.md @@ -15,16 +15,9 @@ | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | IT00000136 4 D's (dismiss, distort, distract, dismay...Official channels ie: Embassies & Defence Ministry; TASS | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000139 cultivate, manipulate, exploit useful idiots (Roger Waters; Venessa Beeley...) | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000137 RT & Sputnik generate information pollution (synthetic media) | -| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000142 YouTube; Reddit; | -| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000143 YouTube; Reddit; | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000140 SEO optimisation/manipulation ("key words") | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | IT00000141 News circulated/amplifed by tertiary sites (Russia Insider, The Duran, Geopolitica.ru, Mint Press News, Oriental Review, globalresearch.ca) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000135 Twitter trolls amplify & manipulate | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000134 Twitter bots amplify & manipulate | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000138 RT & Sputnik generate information pollution (synthetic media) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000139 cultivate, manipulate, exploit useful idiots (Roger Waters; Venessa Beeley...) | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000137 RT & Sputnik generate information pollution (synthetic media) | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000140 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00050.md b/generated_pages/incidents/I00050.md index 6cfb79b..75cd5ac 100644 --- a/generated_pages/incidents/I00050.md +++ b/generated_pages/incidents/I00050.md @@ -18,15 +18,9 @@ Maduro has remained defiant in the face of domestic and international pressure, | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000148 cultivate, manipulate, exploit useful idiots (Roger Waters) | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000146 RT & Sputnik generate information pollution (synthetic media) | -| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000151 YouTube; Reddit; | -| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000152 YouTube; Reddit; | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000149 SEO optimisation/manipulation ("key words") | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | IT00000150 News circulated/amplifed by tertiary sites (Mint Press News, globalresearch.ca) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000145 Twitter trolls amplify & manipulate | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000144 Twitter bots amplify & manipulate | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000147 RT & Sputnik generate information pollution (synthetic media) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000148 cultivate, manipulate, exploit useful idiots (Roger Waters) | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000146 RT & Sputnik generate information pollution (synthetic media) | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000149 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00051.md b/generated_pages/incidents/I00051.md index d0b4b75..585a5f0 100644 --- a/generated_pages/incidents/I00051.md +++ b/generated_pages/incidents/I00051.md @@ -16,15 +16,9 @@ The FCO comments on the IfS were issued after a news report said the group had r | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000158 cultivate, manipulate, exploit useful idiots | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000156 RT & Sputnik generate information pollution | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | IT00000153 hack/leak/manipulate/distort | -| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000159 YouTube; Reddit | -| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000160 YouTube; Reddit | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000161 SEO optimisation/manipulation ("key words") | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000155 Twitter trolls amplify & manipulate | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000154 Twitter bots amplify & manipulate | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000157 RT & Sputnik generate information pollution | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000158 cultivate, manipulate, exploit useful idiots | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000156 RT & Sputnik generate information pollution | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000161 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00053.md b/generated_pages/incidents/I00053.md index df6e562..2690cda 100644 --- a/generated_pages/incidents/I00053.md +++ b/generated_pages/incidents/I00053.md @@ -16,13 +16,9 @@ Geopolitically complex issue combines US/China trade; Security concerns/issues r | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | IT00000167 China also plays victim, innocence, plays by rules, misunderstood narrative | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | IT00000168 Chinese ambassador Lu Shaye accused Canada of applying a double standard, and has decried what he sees as “Western egotism and white supremacy” in the treatment of detained Huawei executive Meng Wanzhou.” | -| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | IT00000163 Distorted, saccharine “news” about the Chinese State and Party | -| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | IT00000165 Extend digital the physical space… gatherings ie: support for Meng outside courthouse | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000162 State-run media seeds foreign influence environment | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | IT00000164 Events coordinated and promoted across media platforms | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | IT00000166 Extend digital the physical space… gatherings ie: support for Meng outside courthouse | +| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | IT00000163 Distorted, saccharine “news” about the Chinese State and Party | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | IT00000164 Events coordinated and promoted across media platforms | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | IT00000166 Extend digital the physical space… gatherings ie: support for Meng outside courthouse | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00056.md b/generated_pages/incidents/I00056.md index 1814673..1ac9ff7 100644 --- a/generated_pages/incidents/I00056.md +++ b/generated_pages/incidents/I00056.md @@ -16,14 +16,9 @@ While there is history to Iran’s information/influence operations, starting wi | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | IT00000171 Fake FB groups/pages/profiles + dark content (non-paid advertising) | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | IT00000175 Fake news/synthetic web-sites | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | IT00000173 Memes... anti-Isreal/USA/West, conspiracy narratives | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | IT00000174 Memes... anti-Isreal/USA/West, conspiracy narratives | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000172 SEO optimisation/manipulation ("key words") | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000170 Twitter trolls amplify & manipulate | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000169 Twitter bots amplify & manipulate | -| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | IT00000176 legacy web content | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | IT00000171 Fake FB groups/pages/profiles + dark content (non-paid advertising) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | IT00000174 Memes... anti-Isreal/USA/West, conspiracy narratives | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000172 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/incidents/I00063.md b/generated_pages/incidents/I00063.md index bde26d3..2d2d347 100644 --- a/generated_pages/incidents/I00063.md +++ b/generated_pages/incidents/I00063.md @@ -17,16 +17,9 @@ The investigation found corroborating evidence after conducting witness intervie | Technique | Description given for this incident | | --------- | ------------------------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | IT00000179 4 D's (dismiss, distort, distract, dismay...Official channels ie: Putin himself; Embassies & Sports Ministry; TASS | -| [T0010 Map Target Audience Information Environment](../generated_pages/techniques/T0010.md) | IT00000182 cultivate, manipulate, exploit useful idiots | -| [T0019 Demand insurmountable proof](../generated_pages/techniques/T0019.md) | IT00000180 RT & Sputnik generate information pollution (synthetic media) | -| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | IT00000185 YouTube; Reddit; | -| [T0032 Build Network](../generated_pages/techniques/T0032.md) | IT00000186 YouTube; Reddit; | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | IT00000183 SEO optimisation/manipulation ("key words") | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | IT00000184 News circulated/amplifed by tertiary sites (Russia Insider, The Duran, Geopolitica.ru, Mint Press News, Oriental Review, globalresearch.ca) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | IT00000178 Twitter trolls amplify & manipulate | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | IT00000177 Twitter bots amplify & manipulate | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | IT00000181 RT & Sputnik generate information pollution (synthetic media) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | IT00000182 cultivate, manipulate, exploit useful idiots | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | IT00000180 RT & Sputnik generate information pollution (synthetic media) | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | IT00000183 SEO optimisation/manipulation ("key words") | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/metatechniques/M013.md b/generated_pages/metatechniques/M013.md index f13038e..b573228 100644 --- a/generated_pages/metatechniques/M013.md +++ b/generated_pages/metatechniques/M013.md @@ -8,7 +8,7 @@ | [C00036 Infiltrate the in-group to discredit leaders (divide)](../generated_pages/counters/C00036.md) | D02 | | [C00060 Legal action against for-profit engagement factories](../generated_pages/counters/C00060.md) | D03 | | [C00067 Denigrate the recipient/ project (of online funding)](../generated_pages/counters/C00067.md) | D03 | -| [C00077 Active defence: run TA03 "develop people” - not recommended](../generated_pages/counters/C00077.md) | D03 | +| [C00077 Active defence: run TA15 "develop people” - not recommended](../generated_pages/counters/C00077.md) | D03 | | [C00153 Take pre-emptive action against actors' infrastructure](../generated_pages/counters/C00153.md) | D03 | | [C00162 Unravel/target the Potemkin villages](../generated_pages/counters/C00162.md) | D03 | | [C00164 compatriot policy](../generated_pages/counters/C00164.md) | D03 | diff --git a/generated_pages/tactics/TA01.md b/generated_pages/tactics/TA01.md index 40edf64..31b00d5 100644 --- a/generated_pages/tactics/TA01.md +++ b/generated_pages/tactics/TA01.md @@ -17,8 +17,8 @@ | Techniques | | ---------- | -| [T0001 Determine Target Audiences](../generated_pages/techniques/T0001.md) | -| [T0002 Determine Strategic Ends](../generated_pages/techniques/T0002.md) | +| [T0073 Determine Target Audiences](../generated_pages/techniques/T0073.md) | +| [T0074 Determine Strategic Ends](../generated_pages/techniques/T0074.md) | diff --git a/generated_pages/tactics/TA02.md b/generated_pages/tactics/TA02.md index 7a76243..7492f74 100644 --- a/generated_pages/tactics/TA02.md +++ b/generated_pages/tactics/TA02.md @@ -24,13 +24,13 @@ | Techniques | | ---------- | -| [T0003 Dismiss](../generated_pages/techniques/T0003.md) | -| [T0004 Distort](../generated_pages/techniques/T0004.md) | -| [T0005 Distract](../generated_pages/techniques/T0005.md) | -| [T0006 Dismay](../generated_pages/techniques/T0006.md) | -| [T0007 Divide](../generated_pages/techniques/T0007.md) | -| [T0008 Degrade Adversary](../generated_pages/techniques/T0008.md) | -| [T0009 Facilitate State Propaganda](../generated_pages/techniques/T0009.md) | +| [T0002 Facilitate State Propaganda](../generated_pages/techniques/T0002.md) | +| [T0066 Degrade Adversary](../generated_pages/techniques/T0066.md) | +| [T0075 Dismiss](../generated_pages/techniques/T0075.md) | +| [T0076 Distort](../generated_pages/techniques/T0076.md) | +| [T0077 Distract](../generated_pages/techniques/T0077.md) | +| [T0078 Dismay](../generated_pages/techniques/T0078.md) | +| [T0079 Divide](../generated_pages/techniques/T0079.md) | diff --git a/generated_pages/tactics/TA05.md b/generated_pages/tactics/TA05.md index 8886c41..cf75451 100644 --- a/generated_pages/tactics/TA05.md +++ b/generated_pages/tactics/TA05.md @@ -1,6 +1,6 @@ -# Tactic TA05: Develop Content +# Tactic TA05: Microtarget -* **Summary:** +* **Summary:** Target very specific populations of people * **Belongs to phase:** P02 @@ -14,15 +14,10 @@ | Techniques | | ---------- | -| [T0020 Reuse Existing Content](../generated_pages/techniques/T0020.md) | -| [T0021 Develop Text-based Content](../generated_pages/techniques/T0021.md) | -| [T0022 Develop Image-based Content](../generated_pages/techniques/T0022.md) | -| [T0023 Develop Video-based Content](../generated_pages/techniques/T0023.md) | -| [T0024 Develop Audio-based Content](../generated_pages/techniques/T0024.md) | -| [T0025 Generate information pollution](../generated_pages/techniques/T0025.md) | -| [T0026 Distort facts](../generated_pages/techniques/T0026.md) | -| [T0027 Create hashtags and search artifacts](../generated_pages/techniques/T0027.md) | -| [T0028 Obtain Private Documents](../generated_pages/techniques/T0028.md) | +| [T0016 Create Clickbait](../generated_pages/techniques/T0016.md) | +| [T0018 Purchase Targeted Advertisements](../generated_pages/techniques/T0018.md) | +| [T0101 Create Localized Content](../generated_pages/techniques/T0101.md) | +| [T0102 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0102.md) | diff --git a/generated_pages/tactics/TA06.md b/generated_pages/tactics/TA06.md index a05fbda..d27fc73 100644 --- a/generated_pages/tactics/TA06.md +++ b/generated_pages/tactics/TA06.md @@ -1,7 +1,6 @@ -# Tactic TA06: Establish Social Assets +# Tactic TA06: Develop Content -* **Summary:** Establishing information assets generates messaging tools, including social media accounts, operation personnel, and organizations, including directly and indirectly managed assets. For assets under their direct control, the operation can add, change, or remove these assets at will. -Establishing information assets allows an influence operation to promote messaging directly to the target audience without navigating through external entities. Many online influence operations create or compromise social media accounts as a primary vector of information dissemination. +* **Summary:** TBD * **Belongs to phase:** P02 @@ -17,18 +16,15 @@ Establishing information assets allows an influence operation to promote messagi | Techniques | | ---------- | -| [T0029 Create Inauthentic Accounts](../generated_pages/techniques/T0029.md) | -| [T0030 Recruit bad actors](../generated_pages/techniques/T0030.md) | -| [T0031 Cultivate ignorant agents](../generated_pages/techniques/T0031.md) | -| [T0032 Build Network](../generated_pages/techniques/T0032.md) | -| [T0033 Acquire/ recruit Network](../generated_pages/techniques/T0033.md) | -| [T0034 Infiltrate Existing Networks](../generated_pages/techniques/T0034.md) | -| [T0035 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0035.md) | -| [T0036 Create inauthentic websites](../generated_pages/techniques/T0036.md) | -| [T0037 Prepare Physical Broadcast Capabilities](../generated_pages/techniques/T0037.md) | -| [T0038 Develop Owned Media Assets](../generated_pages/techniques/T0038.md) | -| [T0039 Prepare fundraising campaigns](../generated_pages/techniques/T0039.md) | -| [T0040 Leverage Content Farm](../generated_pages/techniques/T0040.md) | +| [T0015 Create hashtags and search artifacts](../generated_pages/techniques/T0015.md) | +| [T0019 Generate information pollution](../generated_pages/techniques/T0019.md) | +| [T0023 Distort facts](../generated_pages/techniques/T0023.md) | +| [T0084 Reuse Existing Content](../generated_pages/techniques/T0084.md) | +| [T0085 Develop Text-based Content](../generated_pages/techniques/T0085.md) | +| [T0086 Develop Image-based Content](../generated_pages/techniques/T0086.md) | +| [T0087 Develop Video-based Content](../generated_pages/techniques/T0087.md) | +| [T0088 Develop Audio-based Content](../generated_pages/techniques/T0088.md) | +| [T0089 Obtain Private Documents](../generated_pages/techniques/T0089.md) | diff --git a/generated_pages/tactics/TA07.md b/generated_pages/tactics/TA07.md index dc8fb7b..c9444b4 100644 --- a/generated_pages/tactics/TA07.md +++ b/generated_pages/tactics/TA07.md @@ -1,6 +1,6 @@ -# Tactic TA07: Establish Legitimacy +# Tactic TA07: Select Channels and Affordances -* **Summary:** +* **Summary:** Selecting platforms and affordances assesses which online or offline platforms and their associated affordances maximize an influence operation’s ability to reach its target audience. To select the most appropriate platform(s), an operation may assess the technological affordances including platform algorithms, terms of service, permitted content types, or other attributes that determine platform usability and accessibility. Selecting platforms includes both choosing platforms on which the operation will publish its own content and platforms on which the operation will attempt to restrict adversarial content. * **Belongs to phase:** P02 @@ -14,12 +14,18 @@ | Techniques | | ---------- | -| [T0041 Compromise legitimate accounts](../generated_pages/techniques/T0041.md) | -| [T0042 Create fake experts](../generated_pages/techniques/T0042.md) | -| [T0043 Create personas](../generated_pages/techniques/T0043.md) | -| [T0044 Establish Inauthentic News Sites](../generated_pages/techniques/T0044.md) | -| [T0045 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0045.md) | -| [T0046 Co-opt Trusted Sources](../generated_pages/techniques/T0046.md) | +| [T0029 Online polls](../generated_pages/techniques/T0029.md) | +| [T0043 Chat apps](../generated_pages/techniques/T0043.md) | +| [T0103 Livestream](../generated_pages/techniques/T0103.md) | +| [T0104 Social Networks](../generated_pages/techniques/T0104.md) | +| [T0105 Media Sharing Networks](../generated_pages/techniques/T0105.md) | +| [T0106 Discussion Forums](../generated_pages/techniques/T0106.md) | +| [T0107 Bookmarking and Content Curation](../generated_pages/techniques/T0107.md) | +| [T0108 Blogging and Publishing Networks](../generated_pages/techniques/T0108.md) | +| [T0109 Consumer Review Networks](../generated_pages/techniques/T0109.md) | +| [T0110 Formal Diplomatic Channels](../generated_pages/techniques/T0110.md) | +| [T0111 Traditional Media](../generated_pages/techniques/T0111.md) | +| [T0112 Email](../generated_pages/techniques/T0112.md) | diff --git a/generated_pages/tactics/TA08.md b/generated_pages/tactics/TA08.md index d22cdff..7ff6aea 100644 --- a/generated_pages/tactics/TA08.md +++ b/generated_pages/tactics/TA08.md @@ -1,8 +1,8 @@ -# Tactic TA08: Microtarget +# Tactic TA08: Conduct Pump Priming -* **Summary:** Target very specific populations of people +* **Summary:** Release content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing. -* **Belongs to phase:** P02 +* **Belongs to phase:** P03 @@ -16,10 +16,13 @@ | Techniques | | ---------- | -| [T0047 Create Clickbait](../generated_pages/techniques/T0047.md) | -| [T0048 Purchase Targeted Advertisements](../generated_pages/techniques/T0048.md) | -| [T0049 Create Localized Content](../generated_pages/techniques/T0049.md) | -| [T0050 Leverage Echo Chambers/Filter Bubbles](../generated_pages/techniques/T0050.md) | +| [T0020 Trial content](../generated_pages/techniques/T0020.md) | +| [T0039 Bait legitimate influencers](../generated_pages/techniques/T0039 .md) | +| [T0042 Seed Kernel of truth](../generated_pages/techniques/T0042.md) | +| [T0044 Seed distortions](../generated_pages/techniques/T0044.md) | +| [T0045 Use fake experts](../generated_pages/techniques/T0045.md) | +| [T0046 Use Search Engine Optimization](../generated_pages/techniques/T0046.md) | +| [T0113 Employ Commercial Analytic Firms](../generated_pages/techniques/T0113.md) | diff --git a/generated_pages/tactics/TA09.md b/generated_pages/tactics/TA09.md index a01514c..5b981b5 100644 --- a/generated_pages/tactics/TA09.md +++ b/generated_pages/tactics/TA09.md @@ -1,8 +1,8 @@ -# Tactic TA09: Select Channels and Affordances +# Tactic TA09: Deliver Content -* **Summary:** Selecting platforms and affordances assesses which online or offline platforms and their associated affordances maximize an influence operation’s ability to reach its target audience. To select the most appropriate platform(s), an operation may assess the technological affordances including platform algorithms, terms of service, permitted content types, or other attributes that determine platform usability and accessibility. Selecting platforms includes both choosing platforms on which the operation will publish its own content and platforms on which the operation will attempt to restrict adversarial content. +* **Summary:** Release content to general public or larger population -* **Belongs to phase:** P02 +* **Belongs to phase:** P03 @@ -16,18 +16,10 @@ | Techniques | | ---------- | -| [T0051 Chat apps](../generated_pages/techniques/T0051.md) | -| [T0052 Livestream](../generated_pages/techniques/T0052.md) | -| [T0053 Social Networks](../generated_pages/techniques/T0053.md) | -| [T0054 Media Sharing Networks](../generated_pages/techniques/T0054.md) | -| [T0055 Discussion Forums](../generated_pages/techniques/T0055.md) | -| [T0056 Bookmarking and Content Curation](../generated_pages/techniques/T0056.md) | -| [T0057 Blogging and Publishing Networks](../generated_pages/techniques/T0057.md) | -| [T0058 Consumer Review Networks](../generated_pages/techniques/T0058.md) | -| [T0059 Online polls](../generated_pages/techniques/T0059.md) | -| [T0060 Formal Diplomatic Channels](../generated_pages/techniques/T0060.md) | -| [T0061 Traditional Media](../generated_pages/techniques/T0061.md) | -| [T0062 Email](../generated_pages/techniques/T0062.md) | +| [T0114 Deliver Ads](../generated_pages/techniques/T0114.md) | +| [T0115 Post Content](../generated_pages/techniques/T0115.md) | +| [T0116 Comment or Reply on Content](../generated_pages/techniques/T0116.md) | +| [T0117 Attract Traditional Media](../generated_pages/techniques/T0117.md) | diff --git a/generated_pages/tactics/TA10.md b/generated_pages/tactics/TA10.md index 2e36426..5578f9a 100644 --- a/generated_pages/tactics/TA10.md +++ b/generated_pages/tactics/TA10.md @@ -1,6 +1,6 @@ -# Tactic TA10: Conduct Pump Priming +# Tactic TA10: Drive Offline Activity -* **Summary:** Release content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing. +* **Summary:** Move incident/campaign from online to offline. Encouraging users to move from the platform on which they initially viewed operation content and engage in the physical information space or offline world. This may include operation-aligned rallies or protests, radio, newspaper, or billboards. An influence operation may drive to physical forums to diversify its information channels and facilitate spaces where the target audience can engage with both operation content and like-minded individuals offline. * **Belongs to phase:** P03 @@ -14,13 +14,11 @@ | Techniques | | ---------- | -| [T0063 Trial content](../generated_pages/techniques/T0063.md) | -| [T0064 Bait legitimate influencers](../generated_pages/techniques/T0064.md) | -| [T0065 Seed Kernel of truth](../generated_pages/techniques/T0065.md) | -| [T0066 Seed distortions](../generated_pages/techniques/T0066.md) | -| [T0067 Use fake experts](../generated_pages/techniques/T0067.md) | -| [T0068 Use Search Engine Optimization](../generated_pages/techniques/T0068.md) | -| [T0069 Employ Commercial Analytic Firms](../generated_pages/techniques/T0069.md) | +| [T0017 Conduct fundraising](../generated_pages/techniques/T0017.md) | +| [T0057 Organize Events](../generated_pages/techniques/T0057.md) | +| [T0061 Sell Merchandise](../generated_pages/techniques/T0061.md) | +| [T0126 Encourage Attendance at Events](../generated_pages/techniques/T0126.md) | +| [T0127 Physical Violence](../generated_pages/techniques/T0127.md) | diff --git a/generated_pages/tactics/TA11.md b/generated_pages/tactics/TA11.md index 2cb430c..1999bbe 100644 --- a/generated_pages/tactics/TA11.md +++ b/generated_pages/tactics/TA11.md @@ -1,6 +1,6 @@ -# Tactic TA11: Deliver Content +# Tactic TA11: Persist in the Information Environment -* **Summary:** Release content to general public or larger population +* **Summary:** Persist in the Information Space refers to taking measures that allow an operation to maintain its presence and avoid takedown by an external entity. Techniques in Persist in the Information Space help campaigns operate without detection and appear legitimate to the target audience and platform monitoring services. Influence operations on social media often persist online by varying the type of information assets and platforms used throughout the campaign. * **Belongs to phase:** P03 @@ -19,10 +19,12 @@ | Techniques | | ---------- | -| [T0070 Deliver Ads](../generated_pages/techniques/T0070.md) | -| [T0071 Post Content](../generated_pages/techniques/T0071.md) | -| [T0072 Comment or Reply on Content](../generated_pages/techniques/T0072.md) | -| [T0073 Attract Traditional Media](../generated_pages/techniques/T0073.md) | +| [T0059 Play the long game](../generated_pages/techniques/T0059.md) | +| [T0060 Continue to Amplify](../generated_pages/techniques/T0060.md) | +| [T0128 Conceal People](../generated_pages/techniques/T0128.md) | +| [T0129 Conceal Operational Activity](../generated_pages/techniques/T0129.md) | +| [T0130 Conceal Infrastructure](../generated_pages/techniques/T0130.md) | +| [T0131 Exploit TOS/Content Moderation](../generated_pages/techniques/T0131.md) | diff --git a/generated_pages/tactics/TA12.md b/generated_pages/tactics/TA12.md index eb554b4..42c5f3e 100644 --- a/generated_pages/tactics/TA12.md +++ b/generated_pages/tactics/TA12.md @@ -1,8 +1,8 @@ -# Tactic TA12: Maximize Exposure +# Tactic TA12: Assess Effectiveness -* **Summary:** Maximize exposure of the target audience to incident/campaign content via flooding, amplifying, and cross-posting. +* **Summary:** Assess effectiveness of action, for use in future plans -* **Belongs to phase:** P03 +* **Belongs to phase:** P04 @@ -17,12 +17,9 @@ | Techniques | | ---------- | -| [T0074 Flooding the Information Space](../generated_pages/techniques/T0074.md) | -| [T0075 Amplify Existing Narrative](../generated_pages/techniques/T0075.md) | -| [T0076 Cross-Posting](../generated_pages/techniques/T0076.md) | -| [T0077 Incentivize Sharing](../generated_pages/techniques/T0077.md) | -| [T0078 Manipulate Platform Algorithm](../generated_pages/techniques/T0078.md) | -| [T0079 Direct Users to Alternative Platforms](../generated_pages/techniques/T0079.md) | +| [T0132 Measure Performance](../generated_pages/techniques/T0132.md) | +| [T0133 Measure Effectiveness](../generated_pages/techniques/T0133.md) | +| [T0134 Measure Effectiveness Indicators (or KPIs)](../generated_pages/techniques/T0134.md) | diff --git a/generated_pages/tactics/TA13.md b/generated_pages/tactics/TA13.md index 3f048b2..50fe2a2 100644 --- a/generated_pages/tactics/TA13.md +++ b/generated_pages/tactics/TA13.md @@ -1,8 +1,8 @@ -# Tactic TA13: Drive Online Harms +# Tactic TA13: Target Audience Analysis -* **Summary:** Actions taken by an influence operation to harm their opponents in online spaces through harassment, suppression, releasing private information, and controlling the information space through offensive cyberspace operations. +* **Summary:** Identifying and analyzing the target audience examines target audience member locations, political affiliations, financial situations, and other attributes that an influence operation may incorporate into its messaging strategy. During this tactic, influence operations may also identify existing similarities and differences between target audience members to unite like groups and divide opposing groups. Identifying and analyzing target audience members allows influence operations to tailor operation strategy and content to their analysis. -* **Belongs to phase:** P03 +* **Belongs to phase:** P01 @@ -13,11 +13,9 @@ | Techniques | | ---------- | -| [T0080 Harass](../generated_pages/techniques/T0080.md) | -| [T0081 Censor social media as a political force](../generated_pages/techniques/T0081.md) | -| [T0082 Control Information Environment through Offensive Cyberspace Operations](../generated_pages/techniques/T0082.md) | -| [T0083 Suppress Opposition](../generated_pages/techniques/T0083.md) | -| [T0084 Platform Filtering](../generated_pages/techniques/T0084.md) | +| [T0072 Segment Audiences](../generated_pages/techniques/T0072.md) | +| [T0080 Map Target Audience Information Environment](../generated_pages/techniques/T0080.md) | +| [T0081 Identify Social and Technical Vulnerabilities](../generated_pages/techniques/T0081.md) | diff --git a/generated_pages/tactics/TA14.md b/generated_pages/tactics/TA14.md index 8bb9d3b..f34d97a 100644 --- a/generated_pages/tactics/TA14.md +++ b/generated_pages/tactics/TA14.md @@ -1,8 +1,8 @@ -# Tactic TA14: Drive Offline Activity +# Tactic TA14: Develop Narratives -* **Summary:** Move incident/campaign from online to offline. Encouraging users to move from the platform on which they initially viewed operation content and engage in the physical information space or offline world. This may include operation-aligned rallies or protests, radio, newspaper, or billboards. An influence operation may drive to physical forums to diversify its information channels and facilitate spaces where the target audience can engage with both operation content and like-minded individuals offline. +* **Summary:** The promotion of beneficial master narratives is perhaps the most effective method for achieving long-term strategic narrative dominance. From a ""whole of society"" perspective the promotion of the society's core master narratives should occupy a central strategic role. From a misinformation campaign / cognitive security perpectve the tactics around master narratives center more precisely on the day-to-day promotion and reinforcement of this messaging. In other words, beneficial, high-coverage master narratives are a central strategic goal and their promotion constitutes an ongoing tactical struggle carried out at a whole-of-society level. Tactically, their promotion covers a broad spectrum of activities both on- and offline. -* **Belongs to phase:** P03 +* **Belongs to phase:** P02 @@ -13,11 +13,13 @@ | Techniques | | ---------- | -| [T0085 Encourage Attendance at Events](../generated_pages/techniques/T0085.md) | -| [T0086 Organize Events](../generated_pages/techniques/T0086.md) | -| [T0087 Conduct fundraising](../generated_pages/techniques/T0087.md) | -| [T0088 Physical Violence](../generated_pages/techniques/T0088.md) | -| [T0089 Merchandising/ Advertising](../generated_pages/techniques/T0089.md) | +| [T0003 Leverage Existing Narratives](../generated_pages/techniques/T0003.md) | +| [T0004 Develop Competing Narratives](../generated_pages/techniques/T0004.md) | +| [T0022 Leverage Conspiracy Theory Narratives](../generated_pages/techniques/T0022.md) | +| [T0040 Demand insurmountable proof](../generated_pages/techniques/T0040.md) | +| [T0068 Respond to Breaking News Event or Active Crisis](../generated_pages/techniques/T0068.md) | +| [T0082 Develop New Narratives](../generated_pages/techniques/T0082.md) | +| [T0083 Integrate Target Audience Vulnerabilities into Narrative](../generated_pages/techniques/T0083.md) | diff --git a/generated_pages/tactics/TA15.md b/generated_pages/tactics/TA15.md index a5a4d39..700bf6f 100644 --- a/generated_pages/tactics/TA15.md +++ b/generated_pages/tactics/TA15.md @@ -1,28 +1,72 @@ -# Tactic TA15: Persist in the Information Environment +# Tactic TA15: Establish Social Assets -* **Summary:** Persist in the Information Space refers to taking measures that allow an operation to maintain its presence and avoid takedown by an external entity. Techniques in Persist in the Information Space help campaigns operate without detection and appear legitimate to the target audience and platform monitoring services. Influence operations on social media often persist online by varying the type of information assets and platforms used throughout the campaign. +* **Summary:** Establishing information assets generates messaging tools, including social media accounts, operation personnel, and organizations, including directly and indirectly managed assets. For assets under their direct control, the operation can add, change, or remove these assets at will. +Establishing information assets allows an influence operation to promote messaging directly to the target audience without navigating through external entities. Many online influence operations create or compromise social media accounts as a primary vector of information dissemination. -* **Belongs to phase:** P03 +* **Belongs to phase:** P02 | Tasks | | ----- | +| [TK0010 Create personas](../generated_pages/tasks/TK0010.md) | +| [TK0011 Recruit contractors](../generated_pages/tasks/TK0011.md) | +| [TK0012 Recruit partisans](../generated_pages/tasks/TK0012.md) | +| [TK0013 find influencers](../generated_pages/tasks/TK0013.md) | +| [TK0014 Network building](../generated_pages/tasks/TK0014.md) | +| [TK0015 Network infiltration](../generated_pages/tasks/TK0015.md) | +| [TK0016 identify targets - susceptible audience members in networks](../generated_pages/tasks/TK0016.md) | +| [TK0033 OPSEC for TA15](../generated_pages/tasks/TK0033.md) | +| [TK0034 OPSEC for TA15](../generated_pages/tasks/TK0034.md) | | Techniques | | ---------- | -| [T0090 Conceal People](../generated_pages/techniques/T0090.md) | -| [T0091 Conceal Operational Activity](../generated_pages/techniques/T0091.md) | -| [T0092 Conceal Infrastructure](../generated_pages/techniques/T0092.md) | -| [T0093 Exploit TOS/Content Moderation](../generated_pages/techniques/T0093.md) | -| [T0094 Play the long game](../generated_pages/techniques/T0094.md) | +| [T0007 Create Inauthentic Social Media Pages and Groups](../generated_pages/techniques/T0007.md) | +| [T0010 Cultivate ignorant agents](../generated_pages/techniques/T0010.md) | +| [T0013 Create inauthentic websites](../generated_pages/techniques/T0013.md) | +| [T0014 Prepare fundraising campaigns](../generated_pages/techniques/T0014.md) | +| [T0065 Prepare Physical Broadcast Capabilities](../generated_pages/techniques/T0065.md) | +| [T0090 Create Inauthentic Accounts](../generated_pages/techniques/T0090.md) | +| [T0091 Recruit bad actors](../generated_pages/techniques/T0091.md) | +| [T0092 Build Network](../generated_pages/techniques/T0092.md) | +| [T0093 Acquire/ recruit Network](../generated_pages/techniques/T0093.md) | +| [T0094 Infiltrate Existing Networks](../generated_pages/techniques/T0094.md) | +| [T0095 Develop Owned Media Assets](../generated_pages/techniques/T0095.md) | +| [T0096 Leverage Content Farm](../generated_pages/techniques/T0096.md) | | Counters | Response types | | -------- | -------------- | +| [C00036 Infiltrate the in-group to discredit leaders (divide)](../generated_pages/counters/C00036.md) | D02 | +| [C00040 third party verification for people](../generated_pages/counters/C00040.md) | D02 | +| [C00051 Counter social engineering training](../generated_pages/counters/C00051.md) | D02 | +| [C00056 Encourage people to leave social media](../generated_pages/counters/C00056.md) | D02 | +| [C00058 Report crowdfunder as violator](../generated_pages/counters/C00058.md) | D02 | +| [C00059 Verification of project before posting fund requests](../generated_pages/counters/C00059.md) | D02 | +| [C00155 Ban incident actors from funding sites](../generated_pages/counters/C00155.md) | D02 | +| [C00160 find and train influencers](../generated_pages/counters/C00160.md) | D02 | +| [C00172 social media source removal](../generated_pages/counters/C00172.md) | D02 | +| [C00197 remove suspicious accounts](../generated_pages/counters/C00197.md) | D02 | +| [C00044 Keep people from posting to social media immediately](../generated_pages/counters/C00044.md) | D03 | +| [C00067 Denigrate the recipient/ project (of online funding)](../generated_pages/counters/C00067.md) | D03 | +| [C00077 Active defence: run TA15 "develop people” - not recommended](../generated_pages/counters/C00077.md) | D03 | +| [C00133 Deplatform Account*](../generated_pages/counters/C00133.md) | D03 | +| [C00135 Deplatform message groups and/or message boards](../generated_pages/counters/C00135.md) | D03 | +| [C00162 Unravel/target the Potemkin villages](../generated_pages/counters/C00162.md) | D03 | +| [C00203 Stop offering press credentials to propaganda outlets](../generated_pages/counters/C00203.md) | D03 | +| [C00034 Create more friction at account creation](../generated_pages/counters/C00034.md) | D04 | +| [C00042 Address truth contained in narratives](../generated_pages/counters/C00042.md) | D04 | +| [C00046 Marginalise and discredit extremist groups](../generated_pages/counters/C00046.md) | D04 | +| [C00052 Infiltrate platforms](../generated_pages/counters/C00052.md) | D04 | +| [C00053 Delete old accounts / Remove unused social media accounts](../generated_pages/counters/C00053.md) | D04 | +| [C00062 Free open library sources worldwide](../generated_pages/counters/C00062.md) | D04 | +| [C00047 Honeypot with coordinated inauthentics](../generated_pages/counters/C00047.md) | D05 | +| [C00189 Ensure that platforms are taking down flagged accounts](../generated_pages/counters/C00189.md) | D06 | +| [C00048 Name and Shame Influencers](../generated_pages/counters/C00048.md) | D07 | +| [C00093 Influencer code of conduct](../generated_pages/counters/C00093.md) | D07 | DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/tactics/TA16.md b/generated_pages/tactics/TA16.md index 6c2d565..a78bbe2 100644 --- a/generated_pages/tactics/TA16.md +++ b/generated_pages/tactics/TA16.md @@ -1,8 +1,8 @@ -# Tactic TA16: Assess Effectiveness +# Tactic TA16: Establish Legitimacy -* **Summary:** Assess effectiveness of action, for use in future plans +* **Summary:** TBD -* **Belongs to phase:** P04 +* **Belongs to phase:** P02 @@ -13,9 +13,12 @@ | Techniques | | ---------- | -| [T0095 Measure Performance](../generated_pages/techniques/T0095.md) | -| [T0096 Measure Effectiveness](../generated_pages/techniques/T0096.md) | -| [T0097 Measure Effectiveness Indicators (or KPIs)](../generated_pages/techniques/T0097.md) | +| [T0009 Create fake experts](../generated_pages/techniques/T0009.md) | +| [T0011 Compromise legitimate accounts](../generated_pages/techniques/T0011.md) | +| [T0097 Create personas](../generated_pages/techniques/T0097.md) | +| [T0098 Establish Inauthentic News Sites](../generated_pages/techniques/T0098.md) | +| [T0099 Prepare Assets Impersonating Legitimate Entities](../generated_pages/techniques/T0099.md) | +| [T0100 Co-opt Trusted Sources](../generated_pages/techniques/T0100.md) | diff --git a/generated_pages/tactics/TA17.md b/generated_pages/tactics/TA17.md new file mode 100644 index 0000000..5b9fd91 --- /dev/null +++ b/generated_pages/tactics/TA17.md @@ -0,0 +1,29 @@ +# Tactic TA17: Maximize Exposure + +* **Summary:** Maximize exposure of the target audience to incident/campaign content via flooding, amplifying, and cross-posting. + +* **Belongs to phase:** P03 + + + +| Tasks | +| ----- | + + + +| Techniques | +| ---------- | +| [T0049 Flooding the Information Space](../generated_pages/techniques/T0049.md) | +| [T0118 Amplify Existing Narrative](../generated_pages/techniques/T0118.md) | +| [T0119 Cross-Posting](../generated_pages/techniques/T0119.md) | +| [T0120 Incentivize Sharing](../generated_pages/techniques/T0120.md) | +| [T0121 Manipulate Platform Algorithm](../generated_pages/techniques/T0121.md) | +| [T0122 Direct Users to Alternative Platforms](../generated_pages/techniques/T0122.md) | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/tactics/TA18.md b/generated_pages/tactics/TA18.md new file mode 100644 index 0000000..3731932 --- /dev/null +++ b/generated_pages/tactics/TA18.md @@ -0,0 +1,28 @@ +# Tactic TA18: Drive Online Harms + +* **Summary:** Actions taken by an influence operation to harm their opponents in online spaces through harassment, suppression, releasing private information, and controlling the information space through offensive cyberspace operations. + +* **Belongs to phase:** P03 + + + +| Tasks | +| ----- | + + + +| Techniques | +| ---------- | +| [T0047 Censor social media as a political force](../generated_pages/techniques/T0047.md) | +| [T0048 Harass](../generated_pages/techniques/T0048.md) | +| [T0123 Control Information Environment through Offensive Cyberspace Operations](../generated_pages/techniques/T0123.md) | +| [T0124 Suppress Opposition](../generated_pages/techniques/T0124.md) | +| [T0125 Platform Filtering](../generated_pages/techniques/T0125.md) | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/tactics_by_responsetype_table.md b/generated_pages/tactics_by_responsetype_table.md index 6828a06..a15788f 100644 --- a/generated_pages/tactics_by_responsetype_table.md +++ b/generated_pages/tactics_by_responsetype_table.md @@ -30,27 +30,7 @@ 15 -TA03 Target Audience Analysis -7 -4 -3 -0 -1 -2 -17 - - -TA04 Develop Narratives -3 -3 -3 -1 -0 -0 -10 - - -TA05 Develop Content +TA05 Microtarget 1 2 1 @@ -60,7 +40,7 @@ 5 -TA06 Establish Social Assets +TA06 Develop Content 8 8 6 @@ -70,7 +50,7 @@ 23 -TA07 Establish Legitimacy +TA07 Select Channels and Affordances 4 1 1 @@ -80,7 +60,7 @@ 8 -TA08 Microtarget +TA08 Conduct Pump Priming 6 3 3 @@ -90,7 +70,7 @@ 15 -TA09 Select Channels and Affordances +TA09 Deliver Content 3 9 0 @@ -100,7 +80,7 @@ 12 -TA11 Deliver Content +TA11 Persist in the Information Environment 1 2 1 @@ -110,7 +90,7 @@ 4 -TA12 Maximize Exposure +TA12 Assess Effectiveness 0 1 2 @@ -120,6 +100,16 @@ 3 +TA15 Establish Social Assets +10 +7 +6 +1 +1 +2 +27 + + TOTALS 43 53 diff --git a/generated_pages/tactics_index.md b/generated_pages/tactics_index.md index ffa2089..b0ecab7 100644 --- a/generated_pages/tactics_index.md +++ b/generated_pages/tactics_index.md @@ -24,88 +24,88 @@ P01 -TA03 +TA05 +Microtarget +Target very specific populations of people +P02 + + +TA06 +Develop Content +TBD +P02 + + +TA07 +Select Channels and Affordances +Selecting platforms and affordances assesses which online or offline platforms and their associated affordances maximize an influence operation’s ability to reach its target audience. To select the most appropriate platform(s), an operation may assess the technological affordances including platform algorithms, terms of service, permitted content types, or other attributes that determine platform usability and accessibility. Selecting platforms includes both choosing platforms on which the operation will publish its own content and platforms on which the operation will attempt to restrict adversarial content. +P02 + + +TA08 +Conduct Pump Priming +Release content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing. +P03 + + +TA09 +Deliver Content +Release content to general public or larger population +P03 + + +TA10 +Drive Offline Activity +Move incident/campaign from online to offline. Encouraging users to move from the platform on which they initially viewed operation content and engage in the physical information space or offline world. This may include operation-aligned rallies or protests, radio, newspaper, or billboards. An influence operation may drive to physical forums to diversify its information channels and facilitate spaces where the target audience can engage with both operation content and like-minded individuals offline. +P03 + + +TA11 +Persist in the Information Environment +Persist in the Information Space refers to taking measures that allow an operation to maintain its presence and avoid takedown by an external entity. Techniques in Persist in the Information Space help campaigns operate without detection and appear legitimate to the target audience and platform monitoring services. Influence operations on social media often persist online by varying the type of information assets and platforms used throughout the campaign. +P03 + + +TA12 +Assess Effectiveness +Assess effectiveness of action, for use in future plans +P04 + + +TA13 Target Audience Analysis Identifying and analyzing the target audience examines target audience member locations, political affiliations, financial situations, and other attributes that an influence operation may incorporate into its messaging strategy. During this tactic, influence operations may also identify existing similarities and differences between target audience members to unite like groups and divide opposing groups. Identifying and analyzing target audience members allows influence operations to tailor operation strategy and content to their analysis. P01 -TA04 +TA14 Develop Narratives The promotion of beneficial master narratives is perhaps the most effective method for achieving long-term strategic narrative dominance. From a ""whole of society"" perspective the promotion of the society's core master narratives should occupy a central strategic role. From a misinformation campaign / cognitive security perpectve the tactics around master narratives center more precisely on the day-to-day promotion and reinforcement of this messaging. In other words, beneficial, high-coverage master narratives are a central strategic goal and their promotion constitutes an ongoing tactical struggle carried out at a whole-of-society level. Tactically, their promotion covers a broad spectrum of activities both on- and offline. P02 -TA05 -Develop Content - -P02 - - -TA06 +TA15 Establish Social Assets Establishing information assets generates messaging tools, including social media accounts, operation personnel, and organizations, including directly and indirectly managed assets. For assets under their direct control, the operation can add, change, or remove these assets at will. Establishing information assets allows an influence operation to promote messaging directly to the target audience without navigating through external entities. Many online influence operations create or compromise social media accounts as a primary vector of information dissemination. P02 -TA07 +TA16 Establish Legitimacy - +TBD P02 -TA08 -Microtarget -Target very specific populations of people -P02 - - -TA09 -Select Channels and Affordances -Selecting platforms and affordances assesses which online or offline platforms and their associated affordances maximize an influence operation’s ability to reach its target audience. To select the most appropriate platform(s), an operation may assess the technological affordances including platform algorithms, terms of service, permitted content types, or other attributes that determine platform usability and accessibility. Selecting platforms includes both choosing platforms on which the operation will publish its own content and platforms on which the operation will attempt to restrict adversarial content. -P02 - - -TA10 -Conduct Pump Priming -Release content on a targetted small scale, prior to general release, including releasing seed. Used for preparation before broader release, and as message honing. Used for preparation before broader release, and as message honing. -P03 - - -TA11 -Deliver Content -Release content to general public or larger population -P03 - - -TA12 +TA17 Maximize Exposure Maximize exposure of the target audience to incident/campaign content via flooding, amplifying, and cross-posting. P03 -TA13 +TA18 Drive Online Harms Actions taken by an influence operation to harm their opponents in online spaces through harassment, suppression, releasing private information, and controlling the information space through offensive cyberspace operations. P03 - -TA14 -Drive Offline Activity -Move incident/campaign from online to offline. Encouraging users to move from the platform on which they initially viewed operation content and engage in the physical information space or offline world. This may include operation-aligned rallies or protests, radio, newspaper, or billboards. An influence operation may drive to physical forums to diversify its information channels and facilitate spaces where the target audience can engage with both operation content and like-minded individuals offline. -P03 - - -TA15 -Persist in the Information Environment -Persist in the Information Space refers to taking measures that allow an operation to maintain its presence and avoid takedown by an external entity. Techniques in Persist in the Information Space help campaigns operate without detection and appear legitimate to the target audience and platform monitoring services. Influence operations on social media often persist online by varying the type of information assets and platforms used throughout the campaign. -P03 - - -TA16 -Assess Effectiveness -Assess effectiveness of action, for use in future plans -P04 - diff --git a/generated_pages/tasks/TK0010.md b/generated_pages/tasks/TK0010.md index 9d2f494..2426d43 100644 --- a/generated_pages/tasks/TK0010.md +++ b/generated_pages/tasks/TK0010.md @@ -2,6 +2,6 @@ * **Summary:** Create personas -* **Belongs to tactic stage:** TA03 +* **Belongs to tactic stage:** TA15 DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/tasks/TK0011.md b/generated_pages/tasks/TK0011.md index be96efd..ca3f1f8 100644 --- a/generated_pages/tasks/TK0011.md +++ b/generated_pages/tasks/TK0011.md @@ -2,6 +2,6 @@ * **Summary:** Recruit contractors -* **Belongs to tactic stage:** TA03 +* **Belongs to tactic stage:** TA15 DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/tasks/TK0012.md b/generated_pages/tasks/TK0012.md index 08c916d..181093b 100644 --- a/generated_pages/tasks/TK0012.md +++ b/generated_pages/tasks/TK0012.md @@ -2,6 +2,6 @@ * **Summary:** Recruit partisans -* **Belongs to tactic stage:** TA03 +* **Belongs to tactic stage:** TA15 DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/tasks/TK0013.md b/generated_pages/tasks/TK0013.md index 1cc4560..d0f3545 100644 --- a/generated_pages/tasks/TK0013.md +++ b/generated_pages/tasks/TK0013.md @@ -2,6 +2,6 @@ * **Summary:** find influencers -* **Belongs to tactic stage:** TA03 +* **Belongs to tactic stage:** TA15 DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/tasks/TK0014.md b/generated_pages/tasks/TK0014.md index 6d050f7..12354c9 100644 --- a/generated_pages/tasks/TK0014.md +++ b/generated_pages/tasks/TK0014.md @@ -2,6 +2,6 @@ * **Summary:** Network building -* **Belongs to tactic stage:** TA04 +* **Belongs to tactic stage:** TA15 DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/tasks/TK0015.md b/generated_pages/tasks/TK0015.md index c1751dd..126c0cf 100644 --- a/generated_pages/tasks/TK0015.md +++ b/generated_pages/tasks/TK0015.md @@ -2,6 +2,6 @@ * **Summary:** Network infiltration -* **Belongs to tactic stage:** TA04 +* **Belongs to tactic stage:** TA15 DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/tasks/TK0016.md b/generated_pages/tasks/TK0016.md index 2eb1d3e..0915d91 100644 --- a/generated_pages/tasks/TK0016.md +++ b/generated_pages/tasks/TK0016.md @@ -2,6 +2,6 @@ * **Summary:** identify targets - susceptible audience members in networks -* **Belongs to tactic stage:** TA04 +* **Belongs to tactic stage:** TA15 DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/tasks/TK0033.md b/generated_pages/tasks/TK0033.md index 7e10a88..af4b6e9 100644 --- a/generated_pages/tasks/TK0033.md +++ b/generated_pages/tasks/TK0033.md @@ -1,7 +1,7 @@ -# Task TK0033: OPSEC for TA03 +# Task TK0033: OPSEC for TA15 -* **Summary:** OPSEC for TA03 +* **Summary:** OPSEC for TA15 -* **Belongs to tactic stage:** TA03 +* **Belongs to tactic stage:** TA15 DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/tasks/TK0034.md b/generated_pages/tasks/TK0034.md index 4f8db7e..3ad2664 100644 --- a/generated_pages/tasks/TK0034.md +++ b/generated_pages/tasks/TK0034.md @@ -1,7 +1,7 @@ -# Task TK0034: OPSEC for TA04 +# Task TK0034: OPSEC for TA15 -* **Summary:** OPSEC for TA04 +* **Summary:** OPSEC for TA15 -* **Belongs to tactic stage:** TA04 +* **Belongs to tactic stage:** TA15 DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/tasks_index.md b/generated_pages/tasks_index.md index 19e4e54..5965080 100644 --- a/generated_pages/tasks_index.md +++ b/generated_pages/tasks_index.md @@ -26,6 +26,12 @@ TA01 +TK0031 +OPSEC for TA01 +OPSEC for TA01 +TA01 + + TK0004 Identify target subgroups Identify groups that can best be used to meet incident goals @@ -62,46 +68,70 @@ TA02 +TK0032 +OPSEC for TA02 +OPSEC for TA02 +TA02 + + TK0010 Create personas Create personas -TA03 +TA15 TK0011 Recruit contractors Recruit contractors -TA03 +TA15 TK0012 Recruit partisans Recruit partisans -TA03 +TA15 TK0013 find influencers find influencers -TA03 +TA15 + + +TK0033 +OPSEC for TA15 +OPSEC for TA15 +TA15 TK0014 Network building Network building -TA04 +TA15 TK0015 Network infiltration Network infiltration -TA04 +TA15 TK0016 identify targets - susceptible audience members in networks identify targets - susceptible audience members in networks -TA04 +TA15 + + +TK0034 +OPSEC for TA15 +OPSEC for TA15 +TA15 + + +TK0035 +OPSEC for TA05 +OPSEC for TA05 +TA05 TK0017 @@ -116,6 +146,18 @@ TA06 +TK0036 +OPSEC for TA06 +OPSEC for TA06 +TA06 + + +TK0037 +OPSEC for TA07 +OPSEC for TA07 +TA07 + + TK0019 anchor trust / credibility anchor trust / credibility @@ -128,6 +170,12 @@ TA08 +TK0038 +OPSEC for TA08 +OPSEC for TA08 +TA08 + + TK0021 deamplification (suppression, censoring) deamplification (suppression, censoring) @@ -140,6 +188,18 @@ TA09 +TK0039 +OPSEC for TA09 +OPSEC for TA09 +TA09 + + +TK0040 +OPSEC for TA10 +OPSEC for TA10 +TA10 + + TK0023 retention retention @@ -170,6 +230,12 @@ TA11 +TK0041 +OPSEC for TA11 +OPSEC for TA11 +TA11 + + TK0028 evaluation evaluation @@ -188,72 +254,6 @@ TA12 -TK0031 -OPSEC for TA01 -OPSEC for TA01 -TA01 - - -TK0032 -OPSEC for TA02 -OPSEC for TA02 -TA02 - - -TK0033 -OPSEC for TA03 -OPSEC for TA03 -TA03 - - -TK0034 -OPSEC for TA04 -OPSEC for TA04 -TA04 - - -TK0035 -OPSEC for TA05 -OPSEC for TA05 -TA05 - - -TK0036 -OPSEC for TA06 -OPSEC for TA06 -TA06 - - -TK0037 -OPSEC for TA07 -OPSEC for TA07 -TA07 - - -TK0038 -OPSEC for TA08 -OPSEC for TA08 -TA08 - - -TK0039 -OPSEC for TA09 -OPSEC for TA09 -TA09 - - -TK0040 -OPSEC for TA10 -OPSEC for TA10 -TA10 - - -TK0041 -OPSEC for TA11 -OPSEC for TA11 -TA11 - - TK0042 OPSEC for TA12 OPSEC for TA12 diff --git a/generated_pages/techniques/T0002.md b/generated_pages/techniques/T0002.md index 61e5c5e..5ae5618 100644 --- a/generated_pages/techniques/T0002.md +++ b/generated_pages/techniques/T0002.md @@ -1,8 +1,8 @@ -# Technique T0002: Determine Strategic Ends +# Technique T0002: Facilitate State Propaganda -* **Summary**: +* **Summary**: Organize citizens around pro-state messaging. Coordinate paid or volunteer groups to push state propaganda. -* **Belongs to tactic stage**: TA01 +* **Belongs to tactic stage**: TA02 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0003.md b/generated_pages/techniques/T0003.md index 9b059a6..9e8e06d 100644 --- a/generated_pages/techniques/T0003.md +++ b/generated_pages/techniques/T0003.md @@ -1,8 +1,8 @@ -# Technique T0003: Dismiss +# Technique T0003: Leverage Existing Narratives -* **Summary**: Push back against criticism by dismissing your critics. This might be arguing that the critics use a different standard for you than with other actors or themselves; or arguing that their criticism is biased. +* **Summary**: Use or adapt existing narrative themes, where narratives are the baseline stories of a target audience. Narratives form the bedrock of our worldviews. New information is understood through a process firmly grounded in this bedrock. If new information is not consitent with the prevailing narratives of an audience, it will be ignored. Effective campaigns will frame their misinformation in the context of these narratives. Highly effective campaigns will make extensive use of audience-appropriate archetypes and meta-narratives throughout their content creation and amplifiction practices. -* **Belongs to tactic stage**: TA02 +* **Belongs to tactic stage**: TA14 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0004.md b/generated_pages/techniques/T0004.md index d447340..42d2e3f 100644 --- a/generated_pages/techniques/T0004.md +++ b/generated_pages/techniques/T0004.md @@ -1,8 +1,8 @@ -# Technique T0004: Distort +# Technique T0004: Develop Competing Narratives -* **Summary**: Twist the narrative. Take information, or artifacts like images, and change the framing around them. +* **Summary**: Advance competing narratives connected to same issue ie: on one hand deny incident while at same time expresses dismiss. Suppressing or discouraging narratives already spreading requires an alternative. The most simple set of narrative techniques in response would be the construction and promotion of contradictory alternatives centered on denial, deflection, dismissal, counter-charges, excessive standards of proof, bias in prohibition or enforcement, and so on. These competing narratives allow loyalists cover, but are less compelling to opponents and fence-sitters than campaigns built around existing narratives or highly explanatory master narratives. Competing narratives, as such, are especially useful in the "firehose of misinformation" approach. -* **Belongs to tactic stage**: TA02 +* **Belongs to tactic stage**: TA14 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0007.md b/generated_pages/techniques/T0007.md index 871a9b3..b610cdc 100644 --- a/generated_pages/techniques/T0007.md +++ b/generated_pages/techniques/T0007.md @@ -1,8 +1,8 @@ -# Technique T0007: Divide +# Technique T0007: Create Inauthentic Social Media Pages and Groups -* **Summary**: Create conflict between subgroups, to widen divisions in a community +* **Summary**: Create key social engineering assets needed to amplify content, manipulate algorithms, fool public and/or specific incident/campaign targets. Computational propaganda depends substantially on false perceptions of credibility and acceptance. By creating fake users and groups with a variety of interests and commitments, attackers can ensure that their messages both come from trusted sources and appear more widely adopted than they actually are. -* **Belongs to tactic stage**: TA02 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0009.md b/generated_pages/techniques/T0009.md index bd6e8a3..574c1f6 100644 --- a/generated_pages/techniques/T0009.md +++ b/generated_pages/techniques/T0009.md @@ -1,8 +1,8 @@ -# Technique T0009: Facilitate State Propaganda +# Technique T0009: Create fake experts -* **Summary**: Organize citizens around pro-state messaging. Coordinate paid or volunteer groups to push state propaganda. +* **Summary**: Stories planted or promoted in computational propaganda operations often make use of experts fabricated from whole cloth, sometimes specifically for the story itself. -* **Belongs to tactic stage**: TA02 +* **Belongs to tactic stage**: TA16 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0010.md b/generated_pages/techniques/T0010.md index 4510550..dc4bba7 100644 --- a/generated_pages/techniques/T0010.md +++ b/generated_pages/techniques/T0010.md @@ -1,9 +1,8 @@ -# Technique T0010: Map Target Audience Information Environment +# Technique T0010: Cultivate ignorant agents -* **Summary**: Mapping the target audience information environment analyzes the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience. -Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging. +* **Summary**: Cultivate propagandists for a cause, the goals of which are not fully comprehended, and who are used cynically by the leaders of the cause. Independent actors use social media and specialised web sites to strategically reinforce and spread messages compatible with their own. Their networks are infiltrated and used by state media disinformation organisations to amplify the state’s own disinformation strategies against target populations. Many are traffickers in conspiracy theories or hoaxes, unified by a suspicion of Western governments and mainstream media. Their narratives, which appeal to leftists hostile to globalism and military intervention and nationalists against immigration, are frequently infiltrated and shaped by state-controlled trolls and altered news items from agencies such as RT and Sputnik. Also know as "useful idiots" or "unwitting agents". -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0011.md b/generated_pages/techniques/T0011.md index ecc12ba..2b2e4c8 100644 --- a/generated_pages/techniques/T0011.md +++ b/generated_pages/techniques/T0011.md @@ -1,9 +1,8 @@ -# Technique T0011: Identify Social and Technical Vulnerabilities +# Technique T0011: Compromise legitimate accounts -* **Summary**: Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. -Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. +* **Summary**: Hack or take over legimate accounts to distribute misinformation or damaging content. -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA16 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0012.md b/generated_pages/techniques/T0012.md index 69669bb..8f15cad 100644 --- a/generated_pages/techniques/T0012.md +++ b/generated_pages/techniques/T0012.md @@ -2,7 +2,7 @@ * **Summary**: Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. -* **Belongs to tactic stage**: TA03 +* **Belongs to tactic stage**: TA13 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0013.md b/generated_pages/techniques/T0013.md index ee3cf09..73f57d7 100644 --- a/generated_pages/techniques/T0013.md +++ b/generated_pages/techniques/T0013.md @@ -1,8 +1,8 @@ -# Technique T0013: Develop New Narratives +# Technique T0013: Create inauthentic websites -* **Summary**: +* **Summary**: Create media assets to support inauthentic organizations (e.g. think tank), people (e.g. experts) and/or serve as sites to distribute malware/launch phishing operations. -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0014.md b/generated_pages/techniques/T0014.md index fee9c6d..06b252a 100644 --- a/generated_pages/techniques/T0014.md +++ b/generated_pages/techniques/T0014.md @@ -1,8 +1,8 @@ -# Technique T0014: Leverage Existing Narratives +# Technique T0014: Prepare fundraising campaigns -* **Summary**: Use or adapt existing narrative themes, where narratives are the baseline stories of a target audience. Narratives form the bedrock of our worldviews. New information is understood through a process firmly grounded in this bedrock. If new information is not consitent with the prevailing narratives of an audience, it will be ignored. Effective campaigns will frame their misinformation in the context of these narratives. Highly effective campaigns will make extensive use of audience-appropriate archetypes and meta-narratives throughout their content creation and amplifiction practices. +* **Summary**: Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns (see: Develop Information Pathways) to promote operation messaging while raising money to support its activities. -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0015.md b/generated_pages/techniques/T0015.md index 8901a82..aeedf00 100644 --- a/generated_pages/techniques/T0015.md +++ b/generated_pages/techniques/T0015.md @@ -1,8 +1,8 @@ -# Technique T0015: Develop Competing Narratives +# Technique T0015: Create hashtags and search artifacts -* **Summary**: Advance competing narratives connected to same issue ie: on one hand deny incident while at same time expresses dismiss. Suppressing or discouraging narratives already spreading requires an alternative. The most simple set of narrative techniques in response would be the construction and promotion of contradictory alternatives centered on denial, deflection, dismissal, counter-charges, excessive standards of proof, bias in prohibition or enforcement, and so on. These competing narratives allow loyalists cover, but are less compelling to opponents and fence-sitters than campaigns built around existing narratives or highly explanatory master narratives. Competing narratives, as such, are especially useful in the "firehose of misinformation" approach. +* **Summary**: Create one or more hashtags and/or hashtag groups. Many incident-based campaigns will create hashtags to promote their fabricated event. Creating a hashtag for an incident can have two important effects: 1. Create a perception of reality around an event. Certainly only "real" events would be discussed in a hashtag. After all, the event has a name!, and 2. Publicize the story more widely through trending lists and search behavior. Asset needed to direct/control/manage "conversation" connected to launching new incident/campaign with new hashtag for applicable social media sites). -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0016.md b/generated_pages/techniques/T0016.md index 0e46cf0..a3056b7 100644 --- a/generated_pages/techniques/T0016.md +++ b/generated_pages/techniques/T0016.md @@ -1,8 +1,8 @@ -# Technique T0016: Leverage Conspiracy Theory Narratives +# Technique T0016: Create Clickbait -* **Summary**: "Conspiracy narratives" appeal to the human desire for explanatory order, by invoking the participation of poweful (often sinister) actors in pursuit of their own political goals. These narratives are especially appealing when an audience is low-information, marginalized or otherwise inclined to reject the prevailing explanation. Conspiracy narratives are an important component of the "firehose of falsehoods" model. +* **Summary**: Create attention grabbing headlines (outrage, doubt, humor) required to drive traffic & engagement. This is a key asset. -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA05 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0017.md b/generated_pages/techniques/T0017.md index 0729f89..be6b9a8 100644 --- a/generated_pages/techniques/T0017.md +++ b/generated_pages/techniques/T0017.md @@ -1,8 +1,8 @@ -# Technique T0017: Integrate Target Audience Vulnerabilities into Narrative +# Technique T0017: Conduct fundraising -* **Summary**: An influence operation may seek to exploit the preexisting weaknesses, fears, and enemies of the target audience for integration into the operation’s narratives and overall strategy. Integrating existing vulnerabilities into the operational approach conserves resources by exploiting already weak areas of the target information environment instead of forcing the operation to create new vulnerabilities in the environment. +* **Summary**: Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services166 on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns to promote operation messaging while raising money to support its activities. -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA10 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0018.md b/generated_pages/techniques/T0018.md index bd20be2..a654400 100644 --- a/generated_pages/techniques/T0018.md +++ b/generated_pages/techniques/T0018.md @@ -1,8 +1,8 @@ -# Technique T0018: Respond to Breaking News Event or Active Crisis +# Technique T0018: Purchase Targeted Advertisements -* **Summary**: Media attention on a story or event is heightened during a breaking news event, where unclear facts and incomplete information increase speculation, rumors, and conspiracy theories, which are all vulnerable to manipulation. +* **Summary**: Create or fund advertisements targeted at specific populations -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA05 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0019.md b/generated_pages/techniques/T0019.md index 95c1e94..0877dc9 100644 --- a/generated_pages/techniques/T0019.md +++ b/generated_pages/techniques/T0019.md @@ -1,8 +1,8 @@ -# Technique T0019: Demand insurmountable proof +# Technique T0019: Generate information pollution -* **Summary**: Campaigns often leverage tactical and informational asymmetries on the threat surface, as seen in the Distort and Deny strategies, and the "firehose of misinformation". Specifically, conspiracy theorists can be repeatedly wrong, but advocates of the truth need to be perfect. By constantly escalating demands for proof, propagandists can effectively leverage this asymmetry while also priming its future use, often with an even greater asymmetric advantage. The conspiracist is offered freer rein for a broader range of "questions" while the truth teller is burdened with higher and higher standards of proof. +* **Summary**: Flood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. "Nothing is true, but everything is possible." Akin to astroturfing campaign. -* **Belongs to tactic stage**: TA04 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0020.md b/generated_pages/techniques/T0020.md index 258899c..dc53177 100644 --- a/generated_pages/techniques/T0020.md +++ b/generated_pages/techniques/T0020.md @@ -1,8 +1,8 @@ -# Technique T0020: Reuse Existing Content +# Technique T0020: Trial content -* **Summary**: When an operation recycles content from its own previous operations or plagiarizes from external operations. An operation may launder information to conserve resources that would have otherwise been utilized to develop new content. +* **Summary**: Iteratively test incident performance (messages, content etc), e.g. A/B test headline/content enagagement metrics; website and/or funding campaign conversion rates -* **Belongs to tactic stage**: TA05 +* **Belongs to tactic stage**: TA08 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0021.md b/generated_pages/techniques/T0021.md index 4734e88..718299a 100644 --- a/generated_pages/techniques/T0021.md +++ b/generated_pages/techniques/T0021.md @@ -2,7 +2,7 @@ * **Summary**: -* **Belongs to tactic stage**: TA05 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0022.md b/generated_pages/techniques/T0022.md index 5ce07c3..5b35c7b 100644 --- a/generated_pages/techniques/T0022.md +++ b/generated_pages/techniques/T0022.md @@ -1,8 +1,8 @@ -# Technique T0022: Develop Image-based Content +# Technique T0022: Leverage Conspiracy Theory Narratives -* **Summary**: +* **Summary**: "Conspiracy narratives" appeal to the human desire for explanatory order, by invoking the participation of poweful (often sinister) actors in pursuit of their own political goals. These narratives are especially appealing when an audience is low-information, marginalized or otherwise inclined to reject the prevailing explanation. Conspiracy narratives are an important component of the "firehose of falsehoods" model. -* **Belongs to tactic stage**: TA05 +* **Belongs to tactic stage**: TA14 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0023.md b/generated_pages/techniques/T0023.md index 882c3a4..33111d0 100644 --- a/generated_pages/techniques/T0023.md +++ b/generated_pages/techniques/T0023.md @@ -1,8 +1,8 @@ -# Technique T0023: Develop Video-based Content +# Technique T0023: Distort facts -* **Summary**: +* **Summary**: Change, twist, or exaggerate existing facts to construct a narrative that differs from reality. Examples: images and ideas can be distorted by being placed in an improper content -* **Belongs to tactic stage**: TA05 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0024.md b/generated_pages/techniques/T0024.md index 468cfc2..dd66965 100644 --- a/generated_pages/techniques/T0024.md +++ b/generated_pages/techniques/T0024.md @@ -2,7 +2,7 @@ * **Summary**: -* **Belongs to tactic stage**: TA05 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0025.md b/generated_pages/techniques/T0025.md index ea44aa9..be15f11 100644 --- a/generated_pages/techniques/T0025.md +++ b/generated_pages/techniques/T0025.md @@ -2,7 +2,7 @@ * **Summary**: Flood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. "Nothing is true, but everything is possible." Akin to astroturfing campaign. -* **Belongs to tactic stage**: TA05 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0026.md b/generated_pages/techniques/T0026.md index edb6549..4f67c48 100644 --- a/generated_pages/techniques/T0026.md +++ b/generated_pages/techniques/T0026.md @@ -2,7 +2,7 @@ * **Summary**: Change, twist, or exaggerate existing facts to construct a narrative that differs from reality. Examples: images and ideas can be distorted by being placed in an improper content -* **Belongs to tactic stage**: TA05 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0027.md b/generated_pages/techniques/T0027.md index 27eabc2..df5f1e0 100644 --- a/generated_pages/techniques/T0027.md +++ b/generated_pages/techniques/T0027.md @@ -2,7 +2,7 @@ * **Summary**: Create one or more hashtags and/or hashtag groups. Many incident-based campaigns will create hashtags to promote their fabricated event. Creating a hashtag for an incident can have two important effects: 1. Create a perception of reality around an event. Certainly only "real" events would be discussed in a hashtag. After all, the event has a name!, and 2. Publicize the story more widely through trending lists and search behavior. Asset needed to direct/control/manage "conversation" connected to launching new incident/campaign with new hashtag for applicable social media sites). -* **Belongs to tactic stage**: TA05 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0028.md b/generated_pages/techniques/T0028.md index a553cbe..364f47e 100644 --- a/generated_pages/techniques/T0028.md +++ b/generated_pages/techniques/T0028.md @@ -2,7 +2,7 @@ * **Summary**: -* **Belongs to tactic stage**: TA05 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0029.md b/generated_pages/techniques/T0029.md index 195d5e8..3791c21 100644 --- a/generated_pages/techniques/T0029.md +++ b/generated_pages/techniques/T0029.md @@ -1,8 +1,8 @@ -# Technique T0029: Create Inauthentic Accounts +# Technique T0029: Online polls -* **Summary**: +* **Summary**: Create fake online polls, or manipulate existing online polls. Data gathering tactic to target those who engage, and potentially their networks of friends/followers as well -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA07 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0030.md b/generated_pages/techniques/T0030.md index 7d91678..eef8f0b 100644 --- a/generated_pages/techniques/T0030.md +++ b/generated_pages/techniques/T0030.md @@ -2,7 +2,7 @@ * **Summary**: -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0031.md b/generated_pages/techniques/T0031.md index 0e4cbfc..84f4919 100644 --- a/generated_pages/techniques/T0031.md +++ b/generated_pages/techniques/T0031.md @@ -2,7 +2,7 @@ * **Summary**: Cultivate propagandists for a cause, the goals of which are not fully comprehended, and who are used cynically by the leaders of the cause. Independent actors use social media and specialised web sites to strategically reinforce and spread messages compatible with their own. Their networks are infiltrated and used by state media disinformation organisations to amplify the state’s own disinformation strategies against target populations. Many are traffickers in conspiracy theories or hoaxes, unified by a suspicion of Western governments and mainstream media. Their narratives, which appeal to leftists hostile to globalism and military intervention and nationalists against immigration, are frequently infiltrated and shaped by state-controlled trolls and altered news items from agencies such as RT and Sputnik. Also know as "useful idiots" or "unwitting agents". -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0032.md b/generated_pages/techniques/T0032.md index 6b0695b..00a7f91 100644 --- a/generated_pages/techniques/T0032.md +++ b/generated_pages/techniques/T0032.md @@ -2,7 +2,7 @@ * **Summary**: -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0033.md b/generated_pages/techniques/T0033.md index 80863b3..2fdc86f 100644 --- a/generated_pages/techniques/T0033.md +++ b/generated_pages/techniques/T0033.md @@ -2,7 +2,7 @@ * **Summary**: -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0034.md b/generated_pages/techniques/T0034.md index 48de518..0e11624 100644 --- a/generated_pages/techniques/T0034.md +++ b/generated_pages/techniques/T0034.md @@ -2,7 +2,7 @@ * **Summary**: -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0035.md b/generated_pages/techniques/T0035.md index b10f63c..8509c58 100644 --- a/generated_pages/techniques/T0035.md +++ b/generated_pages/techniques/T0035.md @@ -2,7 +2,7 @@ * **Summary**: Create key social engineering assets needed to amplify content, manipulate algorithms, fool public and/or specific incident/campaign targets. Computational propaganda depends substantially on false perceptions of credibility and acceptance. By creating fake users and groups with a variety of interests and commitments, attackers can ensure that their messages both come from trusted sources and appear more widely adopted than they actually are. -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0036.md b/generated_pages/techniques/T0036.md index 81e1dc3..b3d3589 100644 --- a/generated_pages/techniques/T0036.md +++ b/generated_pages/techniques/T0036.md @@ -2,7 +2,7 @@ * **Summary**: Create media assets to support inauthentic organizations (e.g. think tank), people (e.g. experts) and/or serve as sites to distribute malware/launch phishing operations. -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0037.md b/generated_pages/techniques/T0037.md index 0ba33b7..3ffa563 100644 --- a/generated_pages/techniques/T0037.md +++ b/generated_pages/techniques/T0037.md @@ -2,7 +2,7 @@ * **Summary**: Create or coopt broadcast capabilities (e.g. TV, radio etc). -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0038.md b/generated_pages/techniques/T0038.md index 56b2202..2749ab4 100644 --- a/generated_pages/techniques/T0038.md +++ b/generated_pages/techniques/T0038.md @@ -2,7 +2,7 @@ * **Summary**: An owned media asset refers to an agency or organization through which an influence operation may create, develop, and host content and narratives. Owned media assets include websites, blogs, social media pages, forums, and other platforms that facilitate the creation and organization of content. -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0039 .md b/generated_pages/techniques/T0039 .md new file mode 100644 index 0000000..5ae786d --- /dev/null +++ b/generated_pages/techniques/T0039 .md @@ -0,0 +1,17 @@ +# Technique T0039 : Bait legitimate influencers + +* **Summary**: Credibility in a social media environment is often a function of the size of a user's network. "Influencers" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. By targeting high-influence people and organizations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders. + +* **Belongs to tactic stage**: TA08 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0039.md b/generated_pages/techniques/T0039.md index 9a859b2..c305806 100644 --- a/generated_pages/techniques/T0039.md +++ b/generated_pages/techniques/T0039.md @@ -2,7 +2,7 @@ * **Summary**: Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns (see: Develop Information Pathways) to promote operation messaging while raising money to support its activities. -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0040.md b/generated_pages/techniques/T0040.md index 49dc4e9..afb5406 100644 --- a/generated_pages/techniques/T0040.md +++ b/generated_pages/techniques/T0040.md @@ -1,8 +1,8 @@ -# Technique T0040: Leverage Content Farm +# Technique T0040: Demand insurmountable proof -* **Summary**: +* **Summary**: Campaigns often leverage tactical and informational asymmetries on the threat surface, as seen in the Distort and Deny strategies, and the "firehose of misinformation". Specifically, conspiracy theorists can be repeatedly wrong, but advocates of the truth need to be perfect. By constantly escalating demands for proof, propagandists can effectively leverage this asymmetry while also priming its future use, often with an even greater asymmetric advantage. The conspiracist is offered freer rein for a broader range of "questions" while the truth teller is burdened with higher and higher standards of proof. -* **Belongs to tactic stage**: TA06 +* **Belongs to tactic stage**: TA14 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0041.md b/generated_pages/techniques/T0041.md index dad769b..eca511e 100644 --- a/generated_pages/techniques/T0041.md +++ b/generated_pages/techniques/T0041.md @@ -2,7 +2,7 @@ * **Summary**: Hack or take over legimate accounts to distribute misinformation or damaging content. -* **Belongs to tactic stage**: TA07 +* **Belongs to tactic stage**: TA16 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0042.md b/generated_pages/techniques/T0042.md index c56ccca..0fd6590 100644 --- a/generated_pages/techniques/T0042.md +++ b/generated_pages/techniques/T0042.md @@ -1,8 +1,8 @@ -# Technique T0042: Create fake experts +# Technique T0042: Seed Kernel of truth -* **Summary**: Stories planted or promoted in computational propaganda operations often make use of experts fabricated from whole cloth, sometimes specifically for the story itself. +* **Summary**: Wrap lies or altered context/facts around truths. Influence campaigns pursue a variety of objectives with respect to target audiences, prominent among them: 1. undermine a narrative commonly referenced in the target audience; or 2. promote a narrative less common in the target audience, but preferred by the attacker. In both cases, the attacker is presented with a heavy lift. They must change the relative importance of various narratives in the interpretation of events, despite contrary tendencies. When messaging makes use of factual reporting to promote these adjustments in the narrative space, they are less likely to be dismissed out of hand; when messaging can juxtapose a (factual) truth about current affairs with the (abstract) truth explicated in these narratives, propagandists can undermine or promote them selectively. Context matters. -* **Belongs to tactic stage**: TA07 +* **Belongs to tactic stage**: TA08 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0043.md b/generated_pages/techniques/T0043.md index cc775b3..69cae87 100644 --- a/generated_pages/techniques/T0043.md +++ b/generated_pages/techniques/T0043.md @@ -1,6 +1,6 @@ -# Technique T0043: Create personas +# Technique T0043: Chat apps -* **Summary**: +* **Summary**: Direct messaging via chat app is an increasing method of delivery. These messages are often automated and new delivery and storage methods make them anonymous, viral, and ephemeral. This is a difficult space to monitor, but also a difficult space to build acclaim or notoriety. * **Belongs to tactic stage**: TA07 diff --git a/generated_pages/techniques/T0044.md b/generated_pages/techniques/T0044.md index b4e0d83..e4930c6 100644 --- a/generated_pages/techniques/T0044.md +++ b/generated_pages/techniques/T0044.md @@ -1,8 +1,8 @@ -# Technique T0044: Establish Inauthentic News Sites +# Technique T0044: Seed distortions -* **Summary**: Modern computational propaganda makes use of a cadre of imposter news sites spreading globally. These sites, sometimes motivated by concerns other than propaganda--for instance, click-based revenue--often have some superficial markers of authenticity, such as naming and site-design. But many can be quickly exposed with reference to their owenership, reporting history and adverstising details. +* **Summary**: Try a wide variety of messages in the early hours surrounding an incident or event, to give a misleading account or impression. -* **Belongs to tactic stage**: TA07 +* **Belongs to tactic stage**: TA08 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0045.md b/generated_pages/techniques/T0045.md index b4ab19b..79bc9a3 100644 --- a/generated_pages/techniques/T0045.md +++ b/generated_pages/techniques/T0045.md @@ -1,9 +1,8 @@ -# Technique T0045: Prepare Assets Impersonating Legitimate Entities +# Technique T0045: Use fake experts -* **Summary**: An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities. -An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entity’s website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct. +* **Summary**: Use the fake experts that were set up during Establish Legitimacy. Pseudo-experts are disposable assets that often appear once and then disappear. Give "credility" to misinformation. Take advantage of credential bias -* **Belongs to tactic stage**: TA07 +* **Belongs to tactic stage**: TA08 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0046.md b/generated_pages/techniques/T0046.md index ed4628f..07a0fe3 100644 --- a/generated_pages/techniques/T0046.md +++ b/generated_pages/techniques/T0046.md @@ -1,11 +1,8 @@ -# Technique T0046: Co-opt Trusted Sources +# Technique T0046: Use Search Engine Optimization -* **Summary**: An influence operation may co-opt trusted sources by infiltrating or repurposing a source to reach a target audience through existing, previously reliable networks. Co-opted trusted sources may include: -- National or local new outlets -- Research or academic publications -- Online blogs or websites +* **Summary**: Manipulate content engagement metrics (ie: Reddit & Twitter) to influence/impact news search results (e.g. Google), also elevates RT & Sputnik headline into Google news alert emails. aka "Black-hat SEO" -* **Belongs to tactic stage**: TA07 +* **Belongs to tactic stage**: TA08 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0047.md b/generated_pages/techniques/T0047.md index e12da70..682bdae 100644 --- a/generated_pages/techniques/T0047.md +++ b/generated_pages/techniques/T0047.md @@ -1,8 +1,8 @@ -# Technique T0047: Create Clickbait +# Technique T0047: Censor social media as a political force -* **Summary**: Create attention grabbing headlines (outrage, doubt, humor) required to drive traffic & engagement. This is a key asset. +* **Summary**: Use political influence or the power of state to stop critical social media comments. Government requested/driven content take downs (see Google Transperancy reports). -* **Belongs to tactic stage**: TA08 +* **Belongs to tactic stage**: TA18 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0048.md b/generated_pages/techniques/T0048.md index 5482a2b..d58b5f6 100644 --- a/generated_pages/techniques/T0048.md +++ b/generated_pages/techniques/T0048.md @@ -1,8 +1,8 @@ -# Technique T0048: Purchase Targeted Advertisements +# Technique T0048: Harass -* **Summary**: Create or fund advertisements targeted at specific populations +* **Summary**: Threatening or harassing believers of opposing narratives refers to the use of intimidation techniques, including cyberbullying and doxing, to discourage opponents from voicing their dissent. An influence operation may threaten or harass believers of the opposing narratives to deter individuals from posting or proliferating conflicting content. -* **Belongs to tactic stage**: TA08 +* **Belongs to tactic stage**: TA18 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0049.md b/generated_pages/techniques/T0049.md index de3270f..402cddb 100644 --- a/generated_pages/techniques/T0049.md +++ b/generated_pages/techniques/T0049.md @@ -1,8 +1,8 @@ -# Technique T0049: Create Localized Content +# Technique T0049: Flooding the Information Space -* **Summary**: Localized content refers to content that appeals to a specific community of individuals, often in defined geographic areas. An operation may create localized content using local language and dialects to resonate with its target audience and blend in with other local news and social media. Localized content may help an operation increase legitimacy, avoid detection, and complicate external attribution. +* **Summary**: Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect. -* **Belongs to tactic stage**: TA08 +* **Belongs to tactic stage**: TA17 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0050.md b/generated_pages/techniques/T0050.md index 95bfbf6..0a1834b 100644 --- a/generated_pages/techniques/T0050.md +++ b/generated_pages/techniques/T0050.md @@ -2,7 +2,7 @@ * **Summary**: An echo chamber refers to an internet subgroup, often along ideological lines, where individuals only engage with “others with which they are already in agreement.” A filter bubble refers to an algorithm's placement of an individual in content that they agree with or regularly engage with, possibly entrapping the user into a bubble of their own making. An operation may create these isolated areas of the internet by match existing groups, or aggregating individuals into a single target audience based on shared interests, politics, values, demographics, and other characteristics. Echo chambers and filter bubbles help to reinforce similar biases and content to the same target audience members. -* **Belongs to tactic stage**: TA08 +* **Belongs to tactic stage**: TA05 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0051.md b/generated_pages/techniques/T0051.md index 5e53357..8c03d90 100644 --- a/generated_pages/techniques/T0051.md +++ b/generated_pages/techniques/T0051.md @@ -2,7 +2,7 @@ * **Summary**: Direct messaging via chat app is an increasing method of delivery. These messages are often automated and new delivery and storage methods make them anonymous, viral, and ephemeral. This is a difficult space to monitor, but also a difficult space to build acclaim or notoriety. -* **Belongs to tactic stage**: TA09 +* **Belongs to tactic stage**: TA07 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0052.md b/generated_pages/techniques/T0052.md index 2668fc3..cfbbc0b 100644 --- a/generated_pages/techniques/T0052.md +++ b/generated_pages/techniques/T0052.md @@ -2,7 +2,7 @@ * **Summary**: -* **Belongs to tactic stage**: TA09 +* **Belongs to tactic stage**: TA07 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0053.md b/generated_pages/techniques/T0053.md index 7449b77..42bcc0d 100644 --- a/generated_pages/techniques/T0053.md +++ b/generated_pages/techniques/T0053.md @@ -1,8 +1,8 @@ -# Technique T0053: Social Networks +# Technique T0053: Social Networks * **Summary**: -* **Belongs to tactic stage**: TA09 +* **Belongs to tactic stage**: TA07 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0054.md b/generated_pages/techniques/T0054.md index 4020df9..740845f 100644 --- a/generated_pages/techniques/T0054.md +++ b/generated_pages/techniques/T0054.md @@ -2,7 +2,7 @@ * **Summary**: Media sharing networks refer to services whose primary function is the hosting and sharing of specific forms of media. Examples include Instagram, Snapchat, TikTok, Youtube, SoundCloud. -* **Belongs to tactic stage**: TA09 +* **Belongs to tactic stage**: TA07 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0055.md b/generated_pages/techniques/T0055.md index 02e8f28..8c75a65 100644 --- a/generated_pages/techniques/T0055.md +++ b/generated_pages/techniques/T0055.md @@ -2,7 +2,7 @@ * **Summary**: Platforms for finding, discussing, and sharing information and opinions. Examples include Reddit, Quora, Digg, message boards, interest-based discussion forums, etc. -* **Belongs to tactic stage**: TA09 +* **Belongs to tactic stage**: TA07 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0056.md b/generated_pages/techniques/T0056.md index 1009c16..45b251b 100644 --- a/generated_pages/techniques/T0056.md +++ b/generated_pages/techniques/T0056.md @@ -2,7 +2,7 @@ * **Summary**: Platforms for searching, sharing, and curating content and media. Examples include Pinterest, Flipboard, etc. -* **Belongs to tactic stage**: TA09 +* **Belongs to tactic stage**: TA07 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0057.md b/generated_pages/techniques/T0057.md index 7c9b22f..9651845 100644 --- a/generated_pages/techniques/T0057.md +++ b/generated_pages/techniques/T0057.md @@ -1,8 +1,8 @@ -# Technique T0057: Blogging and Publishing Networks +# Technique T0057: Organize Events -* **Summary**: Examples include WordPress, Blogger, Weebly, Tumblr, Medium, etc. +* **Summary**: Coordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives. -* **Belongs to tactic stage**: TA09 +* **Belongs to tactic stage**: TA10 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0058.md b/generated_pages/techniques/T0058.md index 6fee781..8418913 100644 --- a/generated_pages/techniques/T0058.md +++ b/generated_pages/techniques/T0058.md @@ -2,7 +2,7 @@ * **Summary**: Platforms for finding, reviewing, and sharing information about brands, products, services, restaurants, travel destinations, etc. Examples include Yelp, TripAdvisor, etc. -* **Belongs to tactic stage**: TA09 +* **Belongs to tactic stage**: TA07 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0059.md b/generated_pages/techniques/T0059.md index 0e914fc..13f5a46 100644 --- a/generated_pages/techniques/T0059.md +++ b/generated_pages/techniques/T0059.md @@ -1,8 +1,8 @@ -# Technique T0059: Online polls +# Technique T0059: Play the long game -* **Summary**: Create fake online polls, or manipulate existing online polls. Data gathering tactic to target those who engage, and potentially their networks of friends/followers as well +* **Summary**: Play the long game refers to two phenomena: 1. To plan messaging and allow it to grow organically without conducting your own amplification. This is methodical and slow and requires years for the message to take hold 2. To develop a series of seemingly disconnected messaging narratives that eventually combine into a new narrative. -* **Belongs to tactic stage**: TA09 +* **Belongs to tactic stage**: TA11 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0060.md b/generated_pages/techniques/T0060.md index 160b514..79cc091 100644 --- a/generated_pages/techniques/T0060.md +++ b/generated_pages/techniques/T0060.md @@ -1,8 +1,8 @@ -# Technique T0060: Formal Diplomatic Channels +# Technique T0060: Continue to Amplify -* **Summary**: +* **Summary**: continue narrative or message amplification after the main incident work has finished -* **Belongs to tactic stage**: TA09 +* **Belongs to tactic stage**: TA11 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0061.md b/generated_pages/techniques/T0061.md index e9e7b33..1ae7c34 100644 --- a/generated_pages/techniques/T0061.md +++ b/generated_pages/techniques/T0061.md @@ -1,8 +1,8 @@ -# Technique T0061: Traditional Media +# Technique T0061: Sell Merchandise -* **Summary**: Examples include TV, Newspaper, Radio, etc. +* **Summary**: Sell mechandise refers to getting the message or narrative into physical space in the offline world while making money -* **Belongs to tactic stage**: TA09 +* **Belongs to tactic stage**: TA10 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0062.md b/generated_pages/techniques/T0062.md index 08b4dad..50e4bc1 100644 --- a/generated_pages/techniques/T0062.md +++ b/generated_pages/techniques/T0062.md @@ -2,7 +2,7 @@ * **Summary**: -* **Belongs to tactic stage**: TA09 +* **Belongs to tactic stage**: TA07 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0063.md b/generated_pages/techniques/T0063.md index ca04797..86aa69e 100644 --- a/generated_pages/techniques/T0063.md +++ b/generated_pages/techniques/T0063.md @@ -2,7 +2,7 @@ * **Summary**: Iteratively test incident performance (messages, content etc), e.g. A/B test headline/content enagagement metrics; website and/or funding campaign conversion rates -* **Belongs to tactic stage**: TA10 +* **Belongs to tactic stage**: TA08 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0064.md b/generated_pages/techniques/T0064.md index e0d285a..cf2867c 100644 --- a/generated_pages/techniques/T0064.md +++ b/generated_pages/techniques/T0064.md @@ -2,7 +2,7 @@ * **Summary**: Credibility in a social media environment is often a function of the size of a user's network. "Influencers" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. By targeting high-influence people and organizations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders. -* **Belongs to tactic stage**: TA10 +* **Belongs to tactic stage**: TA08 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0065.md b/generated_pages/techniques/T0065.md index ebe6502..0646287 100644 --- a/generated_pages/techniques/T0065.md +++ b/generated_pages/techniques/T0065.md @@ -1,8 +1,8 @@ -# Technique T0065: Seed Kernel of truth +# Technique T0065: Prepare Physical Broadcast Capabilities -* **Summary**: Wrap lies or altered context/facts around truths. Influence campaigns pursue a variety of objectives with respect to target audiences, prominent among them: 1. undermine a narrative commonly referenced in the target audience; or 2. promote a narrative less common in the target audience, but preferred by the attacker. In both cases, the attacker is presented with a heavy lift. They must change the relative importance of various narratives in the interpretation of events, despite contrary tendencies. When messaging makes use of factual reporting to promote these adjustments in the narrative space, they are less likely to be dismissed out of hand; when messaging can juxtapose a (factual) truth about current affairs with the (abstract) truth explicated in these narratives, propagandists can undermine or promote them selectively. Context matters. +* **Summary**: Create or coopt broadcast capabilities (e.g. TV, radio etc). -* **Belongs to tactic stage**: TA10 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0066.md b/generated_pages/techniques/T0066.md index 00eaadc..b271ac0 100644 --- a/generated_pages/techniques/T0066.md +++ b/generated_pages/techniques/T0066.md @@ -1,8 +1,8 @@ -# Technique T0066: Seed distortions +# Technique T0066: Degrade Adversary -* **Summary**: Try a wide variety of messages in the early hours surrounding an incident or event, to give a misleading account or impression. +* **Summary**: Plan to degrade an adversary’s image or ability to act. This could include preparation and use of harmful information about the adversary’s actions or reputation. -* **Belongs to tactic stage**: TA10 +* **Belongs to tactic stage**: TA02 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0067.md b/generated_pages/techniques/T0067.md index 97b2847..271b632 100644 --- a/generated_pages/techniques/T0067.md +++ b/generated_pages/techniques/T0067.md @@ -2,7 +2,7 @@ * **Summary**: Use the fake experts that were set up during Establish Legitimacy. Pseudo-experts are disposable assets that often appear once and then disappear. Give "credility" to misinformation. Take advantage of credential bias -* **Belongs to tactic stage**: TA10 +* **Belongs to tactic stage**: TA08 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0068.md b/generated_pages/techniques/T0068.md index 2980a7d..3afdeaf 100644 --- a/generated_pages/techniques/T0068.md +++ b/generated_pages/techniques/T0068.md @@ -1,8 +1,8 @@ -# Technique T0068: Use Search Engine Optimization +# Technique T0068: Respond to Breaking News Event or Active Crisis -* **Summary**: Manipulate content engagement metrics (ie: Reddit & Twitter) to influence/impact news search results (e.g. Google), also elevates RT & Sputnik headline into Google news alert emails. aka "Black-hat SEO" +* **Summary**: Media attention on a story or event is heightened during a breaking news event, where unclear facts and incomplete information increase speculation, rumors, and conspiracy theories, which are all vulnerable to manipulation. -* **Belongs to tactic stage**: TA10 +* **Belongs to tactic stage**: TA14 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0069.md b/generated_pages/techniques/T0069.md index 79c1548..2e8578b 100644 --- a/generated_pages/techniques/T0069.md +++ b/generated_pages/techniques/T0069.md @@ -2,7 +2,7 @@ * **Summary**: Commercial analytic firms collect data on target audience activities and evaluate the data to detect trends, such as content receiving high click-rates. An influence operation may employ commercial analytic firms to facilitate external collection on its target audience, complicating attribution efforts and better tailoring the content to audience preferences. -* **Belongs to tactic stage**: TA10 +* **Belongs to tactic stage**: TA08 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0070.md b/generated_pages/techniques/T0070.md index aa165fb..74c2aa7 100644 --- a/generated_pages/techniques/T0070.md +++ b/generated_pages/techniques/T0070.md @@ -2,7 +2,7 @@ * **Summary**: Delivering content via any form of paid media or advertising. -* **Belongs to tactic stage**: TA11 +* **Belongs to tactic stage**: TA09 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0071.md b/generated_pages/techniques/T0071.md index d3cc896..d799eb9 100644 --- a/generated_pages/techniques/T0071.md +++ b/generated_pages/techniques/T0071.md @@ -2,7 +2,7 @@ * **Summary**: Delivering content by posting via owned media (assets that the operator controls). -* **Belongs to tactic stage**: TA11 +* **Belongs to tactic stage**: TA09 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0072.md b/generated_pages/techniques/T0072.md index cd2d2fd..3d8760b 100644 --- a/generated_pages/techniques/T0072.md +++ b/generated_pages/techniques/T0072.md @@ -1,8 +1,8 @@ -# Technique T0072: Comment or Reply on Content +# Technique T0072: Segment Audiences -* **Summary**: Delivering content by replying or commenting via owned media (assets that the operator controls). +* **Summary**: Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. -* **Belongs to tactic stage**: TA11 +* **Belongs to tactic stage**: TA13 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0073.md b/generated_pages/techniques/T0073.md index 4a9dde8..57fcfab 100644 --- a/generated_pages/techniques/T0073.md +++ b/generated_pages/techniques/T0073.md @@ -1,8 +1,8 @@ -# Technique T0073: Attract Traditional Media +# Technique T0073: Determine Target Audiences -* **Summary**: Deliver content by attracting the attention of traditional media (earned media). +* **Summary**: tbd -* **Belongs to tactic stage**: TA11 +* **Belongs to tactic stage**: TA01 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0074.md b/generated_pages/techniques/T0074.md index 8562716..ca3ee2e 100644 --- a/generated_pages/techniques/T0074.md +++ b/generated_pages/techniques/T0074.md @@ -1,8 +1,8 @@ -# Technique T0074: Flooding the Information Space +# Technique T0074: Determine Strategic Ends -* **Summary**: Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect. +* **Summary**: tbd -* **Belongs to tactic stage**: TA12 +* **Belongs to tactic stage**: TA01 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0075.md b/generated_pages/techniques/T0075.md index 10bfc69..ff55257 100644 --- a/generated_pages/techniques/T0075.md +++ b/generated_pages/techniques/T0075.md @@ -1,8 +1,8 @@ -# Technique T0075: Amplify Existing Narrative +# Technique T0075: Dismiss -* **Summary**: An influence operation may amplify existing narratives that align with its narratives to support operation objectives. +* **Summary**: Push back against criticism by dismissing your critics. This might be arguing that the critics use a different standard for you than with other actors or themselves; or arguing that their criticism is biased. -* **Belongs to tactic stage**: TA12 +* **Belongs to tactic stage**: TA02 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0076.md b/generated_pages/techniques/T0076.md index 3bfd226..b391342 100644 --- a/generated_pages/techniques/T0076.md +++ b/generated_pages/techniques/T0076.md @@ -1,8 +1,8 @@ -# Technique T0076: Cross-Posting +# Technique T0076: Distort -* **Summary**: Cross-posting refers to posting the same message to multiple internet discussions, social media platforms or accounts, or news groups at one time. An influence operation may post content online in multiple communities and platforms to increase the chances of content exposure to the target audience. +* **Summary**: Twist the narrative. Take information, or artifacts like images, and change the framing around them. -* **Belongs to tactic stage**: TA12 +* **Belongs to tactic stage**: TA02 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0077.md b/generated_pages/techniques/T0077.md index d89f16f..3168f2e 100644 --- a/generated_pages/techniques/T0077.md +++ b/generated_pages/techniques/T0077.md @@ -1,8 +1,8 @@ -# Technique T0077: Incentivize Sharing +# Technique T0077: Distract -* **Summary**: Incentivizing content sharing refers to actions that encourage users to share content themselves, reducing the need for the operation itself to post and promote its own content. +* **Summary**: Shift attention to a different narrative or actor, for instance by accusing critics of the same activity that they’ve accused you of (e.g. police brutality). -* **Belongs to tactic stage**: TA12 +* **Belongs to tactic stage**: TA02 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0078.md b/generated_pages/techniques/T0078.md index a0d459e..d18912b 100644 --- a/generated_pages/techniques/T0078.md +++ b/generated_pages/techniques/T0078.md @@ -1,8 +1,8 @@ -# Technique T0078: Manipulate Platform Algorithm +# Technique T0078: Dismay -* **Summary**: Manipulating a platform algorithm refers to conducting activity on a platform in a way that intentionally targets its underlying algorithm. After analyzing a platform’s algorithm (see: Select Platforms), an influence operation may use a platform in a way that increases its content exposure, avoids content removal, or otherwise benefits the operation’s strategy. For example, an influence operation may use bots to amplify its posts so that the platform’s algorithm recognizes engagement with operation content and further promotes the content on user timelines. +* **Summary**: Threaten the critic or narrator of events. For instance, threaten journalists or news outlets reporting on a story. -* **Belongs to tactic stage**: TA12 +* **Belongs to tactic stage**: TA02 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0079.md b/generated_pages/techniques/T0079.md index 501b17c..609db02 100644 --- a/generated_pages/techniques/T0079.md +++ b/generated_pages/techniques/T0079.md @@ -1,8 +1,8 @@ -# Technique T0079: Direct Users to Alternative Platforms +# Technique T0079: Divide -* **Summary**: Direct users to alternative platforms refers to encouraging users to move from the platform on which they initially viewed operation content and engage with content on alternate information channels, including separate social media channels and inauthentic websites. An operation may drive users to alternative platforms to diversify its information channels and ensure the target audience knows where to access operation content if the initial platform suspends, flags, or otherwise removes original operation assets and content. +* **Summary**: Create conflict between subgroups, to widen divisions in a community -* **Belongs to tactic stage**: TA12 +* **Belongs to tactic stage**: TA02 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0080.md b/generated_pages/techniques/T0080.md index 37a9b0d..6e40cde 100644 --- a/generated_pages/techniques/T0080.md +++ b/generated_pages/techniques/T0080.md @@ -1,6 +1,7 @@ -# Technique T0080: Harass +# Technique T0080: Map Target Audience Information Environment -* **Summary**: Threatening or harassing believers of opposing narratives refers to the use of intimidation techniques, including cyberbullying and doxing, to discourage opponents from voicing their dissent. An influence operation may threaten or harass believers of the opposing narratives to deter individuals from posting or proliferating conflicting content. +* **Summary**: Mapping the target audience information environment analyzes the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience. +Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging. * **Belongs to tactic stage**: TA13 diff --git a/generated_pages/techniques/T0081.md b/generated_pages/techniques/T0081.md index a111335..dc6b997 100644 --- a/generated_pages/techniques/T0081.md +++ b/generated_pages/techniques/T0081.md @@ -1,6 +1,7 @@ -# Technique T0081: Censor social media as a political force +# Technique T0081: Identify Social and Technical Vulnerabilities -* **Summary**: Use political influence or the power of state to stop critical social media comments. Government requested/driven content take downs (see Google Transperancy reports). +* **Summary**: Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. +Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. * **Belongs to tactic stage**: TA13 diff --git a/generated_pages/techniques/T0082.md b/generated_pages/techniques/T0082.md index ca7ae92..07c448a 100644 --- a/generated_pages/techniques/T0082.md +++ b/generated_pages/techniques/T0082.md @@ -1,8 +1,8 @@ -# Technique T0082: Control Information Environment through Offensive Cyberspace Operations +# Technique T0082: Develop New Narratives -* **Summary**: Controling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritize operation messaging or block opposition messaging. +* **Summary**: tbd -* **Belongs to tactic stage**: TA13 +* **Belongs to tactic stage**: TA14 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0083.md b/generated_pages/techniques/T0083.md index 2d926fb..0ff7fea 100644 --- a/generated_pages/techniques/T0083.md +++ b/generated_pages/techniques/T0083.md @@ -1,8 +1,8 @@ -# Technique T0083: Suppress Opposition +# Technique T0083: Integrate Target Audience Vulnerabilities into Narrative -* **Summary**: +* **Summary**: An influence operation may seek to exploit the preexisting weaknesses, fears, and enemies of the target audience for integration into the operation’s narratives and overall strategy. Integrating existing vulnerabilities into the operational approach conserves resources by exploiting already weak areas of the target information environment instead of forcing the operation to create new vulnerabilities in the environment. -* **Belongs to tactic stage**: TA13 +* **Belongs to tactic stage**: TA14 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0084.md b/generated_pages/techniques/T0084.md index e019e28..b3ef09e 100644 --- a/generated_pages/techniques/T0084.md +++ b/generated_pages/techniques/T0084.md @@ -1,8 +1,8 @@ -# Technique T0084: Platform Filtering +# Technique T0084: Reuse Existing Content -* **Summary**: Platform filtering refers to the decontextualization of information as claims cross platforms (from Joan Donovan https://www.hks.harvard.edu/publications/disinformation-design-use-evidence-collages-and-platform-filtering-media-manipulation) +* **Summary**: When an operation recycles content from its own previous operations or plagiarizes from external operations. An operation may launder information to conserve resources that would have otherwise been utilized to develop new content. -* **Belongs to tactic stage**: TA13 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0085.md b/generated_pages/techniques/T0085.md index b222a52..f044c2f 100644 --- a/generated_pages/techniques/T0085.md +++ b/generated_pages/techniques/T0085.md @@ -1,8 +1,8 @@ -# Technique T0085: Encourage Attendance at Events +# Technique T0085: Develop Text-based Content -* **Summary**: Operation encourages attendance at existing real world event. +* **Summary**: tbd -* **Belongs to tactic stage**: TA14 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0086.md b/generated_pages/techniques/T0086.md index c97d329..b136180 100644 --- a/generated_pages/techniques/T0086.md +++ b/generated_pages/techniques/T0086.md @@ -1,8 +1,8 @@ -# Technique T0086: Organize Events +# Technique T0086: Develop Image-based Content -* **Summary**: Coordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives. +* **Summary**: tbd -* **Belongs to tactic stage**: TA14 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0087.md b/generated_pages/techniques/T0087.md index 49eed0a..c930dfd 100644 --- a/generated_pages/techniques/T0087.md +++ b/generated_pages/techniques/T0087.md @@ -1,8 +1,8 @@ -# Technique T0087: Conduct fundraising +# Technique T0087: Develop Video-based Content -* **Summary**: Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services166 on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns to promote operation messaging while raising money to support its activities. +* **Summary**: tbd -* **Belongs to tactic stage**: TA14 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0088.md b/generated_pages/techniques/T0088.md index b6e006d..463748f 100644 --- a/generated_pages/techniques/T0088.md +++ b/generated_pages/techniques/T0088.md @@ -1,8 +1,8 @@ -# Technique T0088: Physical Violence +# Technique T0088: Develop Audio-based Content -* **Summary**: Physical violence refers to the use of force to injure, abuse, damage, or destroy. An influence operation may conduct or encourage physical violence to discourage opponents from promoting conflicting content or draw attention to operation narratives using shock value. +* **Summary**: tbd -* **Belongs to tactic stage**: TA14 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0089.md b/generated_pages/techniques/T0089.md index cae679d..34a0399 100644 --- a/generated_pages/techniques/T0089.md +++ b/generated_pages/techniques/T0089.md @@ -1,8 +1,8 @@ -# Technique T0089: Merchandising/ Advertising +# Technique T0089: Obtain Private Documents -* **Summary**: Merchandising/Advertising refers to getting the message or narrative into physical space in the offline world +* **Summary**: tbd -* **Belongs to tactic stage**: TA14 +* **Belongs to tactic stage**: TA06 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0090.md b/generated_pages/techniques/T0090.md index dfc2d3b..561e570 100644 --- a/generated_pages/techniques/T0090.md +++ b/generated_pages/techniques/T0090.md @@ -1,6 +1,6 @@ -# Technique T0090: Conceal People +# Technique T0090: Create Inauthentic Accounts -* **Summary**: Conceal the identity or provenance of the account and people assets. +* **Summary**: tbd * **Belongs to tactic stage**: TA15 diff --git a/generated_pages/techniques/T0091.md b/generated_pages/techniques/T0091.md index 36a6711..1c4079e 100644 --- a/generated_pages/techniques/T0091.md +++ b/generated_pages/techniques/T0091.md @@ -1,6 +1,6 @@ -# Technique T0091: Conceal Operational Activity +# Technique T0091: Recruit bad actors -* **Summary**: +* **Summary**: tbd * **Belongs to tactic stage**: TA15 diff --git a/generated_pages/techniques/T0092.md b/generated_pages/techniques/T0092.md index 07cfccf..6970f26 100644 --- a/generated_pages/techniques/T0092.md +++ b/generated_pages/techniques/T0092.md @@ -1,6 +1,6 @@ -# Technique T0092: Conceal Infrastructure +# Technique T0092: Build Network -* **Summary**: +* **Summary**: tbd * **Belongs to tactic stage**: TA15 diff --git a/generated_pages/techniques/T0093.md b/generated_pages/techniques/T0093.md index 4aa6e2b..fbd8599 100644 --- a/generated_pages/techniques/T0093.md +++ b/generated_pages/techniques/T0093.md @@ -1,6 +1,6 @@ -# Technique T0093: Exploit TOS/Content Moderation +# Technique T0093: Acquire/ recruit Network -* **Summary**: +* **Summary**: tbd * **Belongs to tactic stage**: TA15 diff --git a/generated_pages/techniques/T0094.md b/generated_pages/techniques/T0094.md index ce174f5..0a4121a 100644 --- a/generated_pages/techniques/T0094.md +++ b/generated_pages/techniques/T0094.md @@ -1,6 +1,6 @@ -# Technique T0094: Play the long game +# Technique T0094: Infiltrate Existing Networks -* **Summary**: Play the long game refers to two phenomena: 1. To plan messaging and allow it to grow organically without conducting your own amplification. This is methodical and slow and requires years for the message to take hold 2. To develop a series of seemingly disconnected messaging narratives that eventually combine into a new narrative. +* **Summary**: tbd * **Belongs to tactic stage**: TA15 diff --git a/generated_pages/techniques/T0095.md b/generated_pages/techniques/T0095.md index 8407e89..e5a3fd1 100644 --- a/generated_pages/techniques/T0095.md +++ b/generated_pages/techniques/T0095.md @@ -1,8 +1,8 @@ -# Technique T0095: Measure Performance +# Technique T0095: Develop Owned Media Assets -* **Summary**: +* **Summary**: An owned media asset refers to an agency or organization through which an influence operation may create, develop, and host content and narratives. Owned media assets include websites, blogs, social media pages, forums, and other platforms that facilitate the creation and organization of content. -* **Belongs to tactic stage**: TA16 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0096.md b/generated_pages/techniques/T0096.md index 1d6c898..ce5fa68 100644 --- a/generated_pages/techniques/T0096.md +++ b/generated_pages/techniques/T0096.md @@ -1,8 +1,8 @@ -# Technique T0096: Measure Effectiveness +# Technique T0096: Leverage Content Farm -* **Summary**: +* **Summary**: tbd -* **Belongs to tactic stage**: TA16 +* **Belongs to tactic stage**: TA15 | Incident | Descriptions given for this incident | diff --git a/generated_pages/techniques/T0097.md b/generated_pages/techniques/T0097.md index 5fe0f4a..0bdbed9 100644 --- a/generated_pages/techniques/T0097.md +++ b/generated_pages/techniques/T0097.md @@ -1,6 +1,6 @@ -# Technique T0097: Measure Effectiveness Indicators (or KPIs) +# Technique T0097: Create personas -* **Summary**: +* **Summary**: tbd * **Belongs to tactic stage**: TA16 diff --git a/generated_pages/techniques/T0098.md b/generated_pages/techniques/T0098.md new file mode 100644 index 0000000..63c7241 --- /dev/null +++ b/generated_pages/techniques/T0098.md @@ -0,0 +1,17 @@ +# Technique T0098: Establish Inauthentic News Sites + +* **Summary**: Modern computational propaganda makes use of a cadre of imposter news sites spreading globally. These sites, sometimes motivated by concerns other than propaganda--for instance, click-based revenue--often have some superficial markers of authenticity, such as naming and site-design. But many can be quickly exposed with reference to their owenership, reporting history and adverstising details. + +* **Belongs to tactic stage**: TA16 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0099.md b/generated_pages/techniques/T0099.md new file mode 100644 index 0000000..e57a621 --- /dev/null +++ b/generated_pages/techniques/T0099.md @@ -0,0 +1,18 @@ +# Technique T0099: Prepare Assets Impersonating Legitimate Entities + +* **Summary**: An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities. +An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entity’s website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct. + +* **Belongs to tactic stage**: TA16 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0100.md b/generated_pages/techniques/T0100.md new file mode 100644 index 0000000..93be171 --- /dev/null +++ b/generated_pages/techniques/T0100.md @@ -0,0 +1,20 @@ +# Technique T0100: Co-opt Trusted Sources + +* **Summary**: An influence operation may co-opt trusted sources by infiltrating or repurposing a source to reach a target audience through existing, previously reliable networks. Co-opted trusted sources may include: +- National or local new outlets +- Research or academic publications +- Online blogs or websites + +* **Belongs to tactic stage**: TA16 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0101.md b/generated_pages/techniques/T0101.md new file mode 100644 index 0000000..dd8506d --- /dev/null +++ b/generated_pages/techniques/T0101.md @@ -0,0 +1,17 @@ +# Technique T0101: Create Localized Content + +* **Summary**: Localized content refers to content that appeals to a specific community of individuals, often in defined geographic areas. An operation may create localized content using local language and dialects to resonate with its target audience and blend in with other local news and social media. Localized content may help an operation increase legitimacy, avoid detection, and complicate external attribution. + +* **Belongs to tactic stage**: TA05 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0102.md b/generated_pages/techniques/T0102.md new file mode 100644 index 0000000..9d94b89 --- /dev/null +++ b/generated_pages/techniques/T0102.md @@ -0,0 +1,17 @@ +# Technique T0102: Leverage Echo Chambers/Filter Bubbles + +* **Summary**: An echo chamber refers to an internet subgroup, often along ideological lines, where individuals only engage with “others with which they are already in agreement.” A filter bubble refers to an algorithm's placement of an individual in content that they agree with or regularly engage with, possibly entrapping the user into a bubble of their own making. An operation may create these isolated areas of the internet by match existing groups, or aggregating individuals into a single target audience based on shared interests, politics, values, demographics, and other characteristics. Echo chambers and filter bubbles help to reinforce similar biases and content to the same target audience members. + +* **Belongs to tactic stage**: TA05 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0103.md b/generated_pages/techniques/T0103.md new file mode 100644 index 0000000..2e0b56d --- /dev/null +++ b/generated_pages/techniques/T0103.md @@ -0,0 +1,17 @@ +# Technique T0103: Livestream + +* **Summary**: tbd + +* **Belongs to tactic stage**: TA07 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0104.md b/generated_pages/techniques/T0104.md new file mode 100644 index 0000000..f3293d9 --- /dev/null +++ b/generated_pages/techniques/T0104.md @@ -0,0 +1,17 @@ +# Technique T0104: Social Networks + +* **Summary**: tbd + +* **Belongs to tactic stage**: TA07 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0105.md b/generated_pages/techniques/T0105.md new file mode 100644 index 0000000..4ed2984 --- /dev/null +++ b/generated_pages/techniques/T0105.md @@ -0,0 +1,17 @@ +# Technique T0105: Media Sharing Networks + +* **Summary**: Media sharing networks refer to services whose primary function is the hosting and sharing of specific forms of media. Examples include Instagram, Snapchat, TikTok, Youtube, SoundCloud. + +* **Belongs to tactic stage**: TA07 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0106.md b/generated_pages/techniques/T0106.md new file mode 100644 index 0000000..c92ea84 --- /dev/null +++ b/generated_pages/techniques/T0106.md @@ -0,0 +1,17 @@ +# Technique T0106: Discussion Forums + +* **Summary**: Platforms for finding, discussing, and sharing information and opinions. Examples include Reddit, Quora, Digg, message boards, interest-based discussion forums, etc. + +* **Belongs to tactic stage**: TA07 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0107.md b/generated_pages/techniques/T0107.md new file mode 100644 index 0000000..c278a64 --- /dev/null +++ b/generated_pages/techniques/T0107.md @@ -0,0 +1,17 @@ +# Technique T0107: Bookmarking and Content Curation + +* **Summary**: Platforms for searching, sharing, and curating content and media. Examples include Pinterest, Flipboard, etc. + +* **Belongs to tactic stage**: TA07 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0108.md b/generated_pages/techniques/T0108.md new file mode 100644 index 0000000..6d1fc28 --- /dev/null +++ b/generated_pages/techniques/T0108.md @@ -0,0 +1,17 @@ +# Technique T0108: Blogging and Publishing Networks + +* **Summary**: Examples include WordPress, Blogger, Weebly, Tumblr, Medium, etc. + +* **Belongs to tactic stage**: TA07 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0109.md b/generated_pages/techniques/T0109.md new file mode 100644 index 0000000..8984ed7 --- /dev/null +++ b/generated_pages/techniques/T0109.md @@ -0,0 +1,17 @@ +# Technique T0109: Consumer Review Networks + +* **Summary**: Platforms for finding, reviewing, and sharing information about brands, products, services, restaurants, travel destinations, etc. Examples include Yelp, TripAdvisor, etc. + +* **Belongs to tactic stage**: TA07 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0110.md b/generated_pages/techniques/T0110.md new file mode 100644 index 0000000..baa7b30 --- /dev/null +++ b/generated_pages/techniques/T0110.md @@ -0,0 +1,17 @@ +# Technique T0110: Formal Diplomatic Channels + +* **Summary**: tbd + +* **Belongs to tactic stage**: TA07 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0111.md b/generated_pages/techniques/T0111.md new file mode 100644 index 0000000..b082d93 --- /dev/null +++ b/generated_pages/techniques/T0111.md @@ -0,0 +1,17 @@ +# Technique T0111: Traditional Media + +* **Summary**: Examples include TV, Newspaper, Radio, etc. + +* **Belongs to tactic stage**: TA07 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0112.md b/generated_pages/techniques/T0112.md new file mode 100644 index 0000000..c7e3c8d --- /dev/null +++ b/generated_pages/techniques/T0112.md @@ -0,0 +1,17 @@ +# Technique T0112: Email + +* **Summary**: tbd + +* **Belongs to tactic stage**: TA07 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0113.md b/generated_pages/techniques/T0113.md new file mode 100644 index 0000000..ff0418c --- /dev/null +++ b/generated_pages/techniques/T0113.md @@ -0,0 +1,17 @@ +# Technique T0113: Employ Commercial Analytic Firms + +* **Summary**: Commercial analytic firms collect data on target audience activities and evaluate the data to detect trends, such as content receiving high click-rates. An influence operation may employ commercial analytic firms to facilitate external collection on its target audience, complicating attribution efforts and better tailoring the content to audience preferences. + +* **Belongs to tactic stage**: TA08 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0114.md b/generated_pages/techniques/T0114.md new file mode 100644 index 0000000..bc91b57 --- /dev/null +++ b/generated_pages/techniques/T0114.md @@ -0,0 +1,17 @@ +# Technique T0114: Deliver Ads + +* **Summary**: Delivering content via any form of paid media or advertising. + +* **Belongs to tactic stage**: TA09 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0115.md b/generated_pages/techniques/T0115.md new file mode 100644 index 0000000..df570c3 --- /dev/null +++ b/generated_pages/techniques/T0115.md @@ -0,0 +1,17 @@ +# Technique T0115: Post Content + +* **Summary**: Delivering content by posting via owned media (assets that the operator controls). + +* **Belongs to tactic stage**: TA09 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0116.md b/generated_pages/techniques/T0116.md new file mode 100644 index 0000000..c17af30 --- /dev/null +++ b/generated_pages/techniques/T0116.md @@ -0,0 +1,17 @@ +# Technique T0116: Comment or Reply on Content + +* **Summary**: Delivering content by replying or commenting via owned media (assets that the operator controls). + +* **Belongs to tactic stage**: TA09 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0117.md b/generated_pages/techniques/T0117.md new file mode 100644 index 0000000..c5d7ac9 --- /dev/null +++ b/generated_pages/techniques/T0117.md @@ -0,0 +1,17 @@ +# Technique T0117: Attract Traditional Media + +* **Summary**: Deliver content by attracting the attention of traditional media (earned media). + +* **Belongs to tactic stage**: TA09 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0118.md b/generated_pages/techniques/T0118.md new file mode 100644 index 0000000..f93295a --- /dev/null +++ b/generated_pages/techniques/T0118.md @@ -0,0 +1,17 @@ +# Technique T0118: Amplify Existing Narrative + +* **Summary**: An influence operation may amplify existing narratives that align with its narratives to support operation objectives. + +* **Belongs to tactic stage**: TA17 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0119.md b/generated_pages/techniques/T0119.md new file mode 100644 index 0000000..cf5df93 --- /dev/null +++ b/generated_pages/techniques/T0119.md @@ -0,0 +1,17 @@ +# Technique T0119: Cross-Posting + +* **Summary**: Cross-posting refers to posting the same message to multiple internet discussions, social media platforms or accounts, or news groups at one time. An influence operation may post content online in multiple communities and platforms to increase the chances of content exposure to the target audience. + +* **Belongs to tactic stage**: TA17 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0120.md b/generated_pages/techniques/T0120.md new file mode 100644 index 0000000..075b3af --- /dev/null +++ b/generated_pages/techniques/T0120.md @@ -0,0 +1,17 @@ +# Technique T0120: Incentivize Sharing + +* **Summary**: Incentivizing content sharing refers to actions that encourage users to share content themselves, reducing the need for the operation itself to post and promote its own content. + +* **Belongs to tactic stage**: TA17 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0121.md b/generated_pages/techniques/T0121.md new file mode 100644 index 0000000..a0196db --- /dev/null +++ b/generated_pages/techniques/T0121.md @@ -0,0 +1,17 @@ +# Technique T0121: Manipulate Platform Algorithm + +* **Summary**: Manipulating a platform algorithm refers to conducting activity on a platform in a way that intentionally targets its underlying algorithm. After analyzing a platform’s algorithm (see: Select Platforms), an influence operation may use a platform in a way that increases its content exposure, avoids content removal, or otherwise benefits the operation’s strategy. For example, an influence operation may use bots to amplify its posts so that the platform’s algorithm recognizes engagement with operation content and further promotes the content on user timelines. + +* **Belongs to tactic stage**: TA17 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0122.md b/generated_pages/techniques/T0122.md new file mode 100644 index 0000000..d62f51f --- /dev/null +++ b/generated_pages/techniques/T0122.md @@ -0,0 +1,17 @@ +# Technique T0122: Direct Users to Alternative Platforms + +* **Summary**: Direct users to alternative platforms refers to encouraging users to move from the platform on which they initially viewed operation content and engage with content on alternate information channels, including separate social media channels and inauthentic websites. An operation may drive users to alternative platforms to diversify its information channels and ensure the target audience knows where to access operation content if the initial platform suspends, flags, or otherwise removes original operation assets and content. + +* **Belongs to tactic stage**: TA17 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0123.md b/generated_pages/techniques/T0123.md new file mode 100644 index 0000000..c698ecd --- /dev/null +++ b/generated_pages/techniques/T0123.md @@ -0,0 +1,17 @@ +# Technique T0123: Control Information Environment through Offensive Cyberspace Operations + +* **Summary**: Controling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritize operation messaging or block opposition messaging. + +* **Belongs to tactic stage**: TA18 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0124.md b/generated_pages/techniques/T0124.md new file mode 100644 index 0000000..e87ae4f --- /dev/null +++ b/generated_pages/techniques/T0124.md @@ -0,0 +1,17 @@ +# Technique T0124: Suppress Opposition + +* **Summary**: tbd + +* **Belongs to tactic stage**: TA18 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0125.md b/generated_pages/techniques/T0125.md new file mode 100644 index 0000000..6410289 --- /dev/null +++ b/generated_pages/techniques/T0125.md @@ -0,0 +1,17 @@ +# Technique T0125: Platform Filtering + +* **Summary**: Platform filtering refers to the decontextualization of information as claims cross platforms (from Joan Donovan https://www.hks.harvard.edu/publications/disinformation-design-use-evidence-collages-and-platform-filtering-media-manipulation) + +* **Belongs to tactic stage**: TA18 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0126.md b/generated_pages/techniques/T0126.md new file mode 100644 index 0000000..fc74524 --- /dev/null +++ b/generated_pages/techniques/T0126.md @@ -0,0 +1,17 @@ +# Technique T0126: Encourage Attendance at Events + +* **Summary**: Operation encourages attendance at existing real world event. + +* **Belongs to tactic stage**: TA10 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0127.md b/generated_pages/techniques/T0127.md new file mode 100644 index 0000000..035d055 --- /dev/null +++ b/generated_pages/techniques/T0127.md @@ -0,0 +1,17 @@ +# Technique T0127: Physical Violence + +* **Summary**: Physical violence refers to the use of force to injure, abuse, damage, or destroy. An influence operation may conduct or encourage physical violence to discourage opponents from promoting conflicting content or draw attention to operation narratives using shock value. + +* **Belongs to tactic stage**: TA10 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0128.md b/generated_pages/techniques/T0128.md new file mode 100644 index 0000000..e3e6391 --- /dev/null +++ b/generated_pages/techniques/T0128.md @@ -0,0 +1,17 @@ +# Technique T0128: Conceal People + +* **Summary**: Conceal the identity or provenance of the account and people assets. + +* **Belongs to tactic stage**: TA11 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0129.md b/generated_pages/techniques/T0129.md new file mode 100644 index 0000000..af4c4b0 --- /dev/null +++ b/generated_pages/techniques/T0129.md @@ -0,0 +1,17 @@ +# Technique T0129: Conceal Operational Activity + +* **Summary**: tbd + +* **Belongs to tactic stage**: TA11 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0130.md b/generated_pages/techniques/T0130.md new file mode 100644 index 0000000..fd06170 --- /dev/null +++ b/generated_pages/techniques/T0130.md @@ -0,0 +1,17 @@ +# Technique T0130: Conceal Infrastructure + +* **Summary**: tbd + +* **Belongs to tactic stage**: TA11 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0131.md b/generated_pages/techniques/T0131.md new file mode 100644 index 0000000..7847db2 --- /dev/null +++ b/generated_pages/techniques/T0131.md @@ -0,0 +1,17 @@ +# Technique T0131: Exploit TOS/Content Moderation + +* **Summary**: tbd + +* **Belongs to tactic stage**: TA11 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0132.md b/generated_pages/techniques/T0132.md new file mode 100644 index 0000000..a8dd3df --- /dev/null +++ b/generated_pages/techniques/T0132.md @@ -0,0 +1,17 @@ +# Technique T0132: Measure Performance + +* **Summary**: tbd + +* **Belongs to tactic stage**: TA12 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0133.md b/generated_pages/techniques/T0133.md new file mode 100644 index 0000000..1dd7b9a --- /dev/null +++ b/generated_pages/techniques/T0133.md @@ -0,0 +1,17 @@ +# Technique T0133: Measure Effectiveness + +* **Summary**: tbd + +* **Belongs to tactic stage**: TA12 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques/T0134.md b/generated_pages/techniques/T0134.md new file mode 100644 index 0000000..d2f9927 --- /dev/null +++ b/generated_pages/techniques/T0134.md @@ -0,0 +1,17 @@ +# Technique T0134: Measure Effectiveness Indicators (or KPIs) + +* **Summary**: tbd + +* **Belongs to tactic stage**: TA12 + + +| Incident | Descriptions given for this incident | +| -------- | -------------------- | + + + +| Counters | Response types | +| -------- | -------------- | + + +DO NOT EDIT ABOVE THIS LINE - PLEASE ADD NOTES BELOW \ No newline at end of file diff --git a/generated_pages/techniques_index.md b/generated_pages/techniques_index.md index 2707c55..3741a92 100644 --- a/generated_pages/techniques_index.md +++ b/generated_pages/techniques_index.md @@ -8,591 +8,597 @@ tactic_id -T0001 -Determine Target Audiences - -TA01 - - T0002 -Determine Strategic Ends - -TA01 - - -T0003 -Dismiss -Push back against criticism by dismissing your critics. This might be arguing that the critics use a different standard for you than with other actors or themselves; or arguing that their criticism is biased. -TA02 - - -T0004 -Distort -Twist the narrative. Take information, or artifacts like images, and change the framing around them. -TA02 - - -T0005 -Distract -Shift attention to a different narrative or actor, for instance by accusing critics of the same activity that they’ve accused you of (e.g. police brutality). -TA02 - - -T0006 -Dismay -Threaten the critic or narrator of events. For instance, threaten journalists or news outlets reporting on a story. -TA02 - - -T0007 -Divide -Create conflict between subgroups, to widen divisions in a community -TA02 - - -T0008 -Degrade Adversary -Plan to degrade an adversary’s image or ability to act. This could include preparation and use of harmful information about the adversary’s actions or reputation. -TA02 - - -T0009 Facilitate State Propaganda Organize citizens around pro-state messaging. Coordinate paid or volunteer groups to push state propaganda. TA02 +T0003 +Leverage Existing Narratives +Use or adapt existing narrative themes, where narratives are the baseline stories of a target audience. Narratives form the bedrock of our worldviews. New information is understood through a process firmly grounded in this bedrock. If new information is not consitent with the prevailing narratives of an audience, it will be ignored. Effective campaigns will frame their misinformation in the context of these narratives. Highly effective campaigns will make extensive use of audience-appropriate archetypes and meta-narratives throughout their content creation and amplifiction practices. +TA14 + + +T0004 +Develop Competing Narratives +Advance competing narratives connected to same issue ie: on one hand deny incident while at same time expresses dismiss. Suppressing or discouraging narratives already spreading requires an alternative. The most simple set of narrative techniques in response would be the construction and promotion of contradictory alternatives centered on denial, deflection, dismissal, counter-charges, excessive standards of proof, bias in prohibition or enforcement, and so on. These competing narratives allow loyalists cover, but are less compelling to opponents and fence-sitters than campaigns built around existing narratives or highly explanatory master narratives. Competing narratives, as such, are especially useful in the "firehose of misinformation" approach. +TA14 + + +T0007 +Create Inauthentic Social Media Pages and Groups +Create key social engineering assets needed to amplify content, manipulate algorithms, fool public and/or specific incident/campaign targets. Computational propaganda depends substantially on false perceptions of credibility and acceptance. By creating fake users and groups with a variety of interests and commitments, attackers can ensure that their messages both come from trusted sources and appear more widely adopted than they actually are. +TA15 + + +T0009 +Create fake experts +Stories planted or promoted in computational propaganda operations often make use of experts fabricated from whole cloth, sometimes specifically for the story itself. +TA16 + + T0010 -Map Target Audience Information Environment -Mapping the target audience information environment analyzes the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience. -Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging. -TA03 +Cultivate ignorant agents +Cultivate propagandists for a cause, the goals of which are not fully comprehended, and who are used cynically by the leaders of the cause. Independent actors use social media and specialised web sites to strategically reinforce and spread messages compatible with their own. Their networks are infiltrated and used by state media disinformation organisations to amplify the state’s own disinformation strategies against target populations. Many are traffickers in conspiracy theories or hoaxes, unified by a suspicion of Western governments and mainstream media. Their narratives, which appeal to leftists hostile to globalism and military intervention and nationalists against immigration, are frequently infiltrated and shaped by state-controlled trolls and altered news items from agencies such as RT and Sputnik. Also know as "useful idiots" or "unwitting agents". +TA15 T0011 -Identify Social and Technical Vulnerabilities -Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. -Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. -TA03 - - -T0012 -Segment Audiences -Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. -TA03 +Compromise legitimate accounts +Hack or take over legimate accounts to distribute misinformation or damaging content. +TA16 T0013 -Develop New Narratives - -TA04 +Create inauthentic websites +Create media assets to support inauthentic organizations (e.g. think tank), people (e.g. experts) and/or serve as sites to distribute malware/launch phishing operations. +TA15 T0014 -Leverage Existing Narratives -Use or adapt existing narrative themes, where narratives are the baseline stories of a target audience. Narratives form the bedrock of our worldviews. New information is understood through a process firmly grounded in this bedrock. If new information is not consitent with the prevailing narratives of an audience, it will be ignored. Effective campaigns will frame their misinformation in the context of these narratives. Highly effective campaigns will make extensive use of audience-appropriate archetypes and meta-narratives throughout their content creation and amplifiction practices. -TA04 +Prepare fundraising campaigns +Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns (see: Develop Information Pathways) to promote operation messaging while raising money to support its activities. +TA15 T0015 -Develop Competing Narratives -Advance competing narratives connected to same issue ie: on one hand deny incident while at same time expresses dismiss. Suppressing or discouraging narratives already spreading requires an alternative. The most simple set of narrative techniques in response would be the construction and promotion of contradictory alternatives centered on denial, deflection, dismissal, counter-charges, excessive standards of proof, bias in prohibition or enforcement, and so on. These competing narratives allow loyalists cover, but are less compelling to opponents and fence-sitters than campaigns built around existing narratives or highly explanatory master narratives. Competing narratives, as such, are especially useful in the "firehose of misinformation" approach. -TA04 +Create hashtags and search artifacts +Create one or more hashtags and/or hashtag groups. Many incident-based campaigns will create hashtags to promote their fabricated event. Creating a hashtag for an incident can have two important effects: 1. Create a perception of reality around an event. Certainly only "real" events would be discussed in a hashtag. After all, the event has a name!, and 2. Publicize the story more widely through trending lists and search behavior. Asset needed to direct/control/manage "conversation" connected to launching new incident/campaign with new hashtag for applicable social media sites). +TA06 T0016 -Leverage Conspiracy Theory Narratives -"Conspiracy narratives" appeal to the human desire for explanatory order, by invoking the participation of poweful (often sinister) actors in pursuit of their own political goals. These narratives are especially appealing when an audience is low-information, marginalized or otherwise inclined to reject the prevailing explanation. Conspiracy narratives are an important component of the "firehose of falsehoods" model. -TA04 +Create Clickbait +Create attention grabbing headlines (outrage, doubt, humor) required to drive traffic & engagement. This is a key asset. +TA05 T0017 -Integrate Target Audience Vulnerabilities into Narrative -An influence operation may seek to exploit the preexisting weaknesses, fears, and enemies of the target audience for integration into the operation’s narratives and overall strategy. Integrating existing vulnerabilities into the operational approach conserves resources by exploiting already weak areas of the target information environment instead of forcing the operation to create new vulnerabilities in the environment. -TA04 +Conduct fundraising +Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services166 on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns to promote operation messaging while raising money to support its activities. +TA10 T0018 -Respond to Breaking News Event or Active Crisis -Media attention on a story or event is heightened during a breaking news event, where unclear facts and incomplete information increase speculation, rumors, and conspiracy theories, which are all vulnerable to manipulation. -TA04 +Purchase Targeted Advertisements +Create or fund advertisements targeted at specific populations +TA05 T0019 -Demand insurmountable proof -Campaigns often leverage tactical and informational asymmetries on the threat surface, as seen in the Distort and Deny strategies, and the "firehose of misinformation". Specifically, conspiracy theorists can be repeatedly wrong, but advocates of the truth need to be perfect. By constantly escalating demands for proof, propagandists can effectively leverage this asymmetry while also priming its future use, often with an even greater asymmetric advantage. The conspiracist is offered freer rein for a broader range of "questions" while the truth teller is burdened with higher and higher standards of proof. -TA04 +Generate information pollution +Flood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. "Nothing is true, but everything is possible." Akin to astroturfing campaign. +TA06 T0020 -Reuse Existing Content -When an operation recycles content from its own previous operations or plagiarizes from external operations. An operation may launder information to conserve resources that would have otherwise been utilized to develop new content. -TA05 - - -T0021 -Develop Text-based Content - -TA05 +Trial content +Iteratively test incident performance (messages, content etc), e.g. A/B test headline/content enagagement metrics; website and/or funding campaign conversion rates +TA08 T0022 -Develop Image-based Content - -TA05 +Leverage Conspiracy Theory Narratives +"Conspiracy narratives" appeal to the human desire for explanatory order, by invoking the participation of poweful (often sinister) actors in pursuit of their own political goals. These narratives are especially appealing when an audience is low-information, marginalized or otherwise inclined to reject the prevailing explanation. Conspiracy narratives are an important component of the "firehose of falsehoods" model. +TA14 T0023 -Develop Video-based Content - -TA05 - - -T0024 -Develop Audio-based Content - -TA05 - - -T0025 -Generate information pollution -Flood social channels; drive traffic/engagement to all assets; create aura/sense/perception of pervasiveness/consensus (for or against or both simultaneously) of an issue or topic. "Nothing is true, but everything is possible." Akin to astroturfing campaign. -TA05 - - -T0026 Distort facts Change, twist, or exaggerate existing facts to construct a narrative that differs from reality. Examples: images and ideas can be distorted by being placed in an improper content -TA05 - - -T0027 -Create hashtags and search artifacts -Create one or more hashtags and/or hashtag groups. Many incident-based campaigns will create hashtags to promote their fabricated event. Creating a hashtag for an incident can have two important effects: 1. Create a perception of reality around an event. Certainly only "real" events would be discussed in a hashtag. After all, the event has a name!, and 2. Publicize the story more widely through trending lists and search behavior. Asset needed to direct/control/manage "conversation" connected to launching new incident/campaign with new hashtag for applicable social media sites). -TA05 - - -T0028 -Obtain Private Documents - -TA05 +TA06 T0029 -Create Inauthentic Accounts - -TA06 +Online polls +Create fake online polls, or manipulate existing online polls. Data gathering tactic to target those who engage, and potentially their networks of friends/followers as well +TA07 -T0030 -Recruit bad actors - -TA06 - - -T0031 -Cultivate ignorant agents -Cultivate propagandists for a cause, the goals of which are not fully comprehended, and who are used cynically by the leaders of the cause. Independent actors use social media and specialised web sites to strategically reinforce and spread messages compatible with their own. Their networks are infiltrated and used by state media disinformation organisations to amplify the state’s own disinformation strategies against target populations. Many are traffickers in conspiracy theories or hoaxes, unified by a suspicion of Western governments and mainstream media. Their narratives, which appeal to leftists hostile to globalism and military intervention and nationalists against immigration, are frequently infiltrated and shaped by state-controlled trolls and altered news items from agencies such as RT and Sputnik. Also know as "useful idiots" or "unwitting agents". -TA06 - - -T0032 -Build Network - -TA06 - - -T0033 -Acquire/ recruit Network - -TA06 - - -T0034 -Infiltrate Existing Networks - -TA06 - - -T0035 -Create Inauthentic Social Media Pages and Groups -Create key social engineering assets needed to amplify content, manipulate algorithms, fool public and/or specific incident/campaign targets. Computational propaganda depends substantially on false perceptions of credibility and acceptance. By creating fake users and groups with a variety of interests and commitments, attackers can ensure that their messages both come from trusted sources and appear more widely adopted than they actually are. -TA06 - - -T0036 -Create inauthentic websites -Create media assets to support inauthentic organizations (e.g. think tank), people (e.g. experts) and/or serve as sites to distribute malware/launch phishing operations. -TA06 - - -T0037 -Prepare Physical Broadcast Capabilities -Create or coopt broadcast capabilities (e.g. TV, radio etc). -TA06 - - -T0038 -Develop Owned Media Assets -An owned media asset refers to an agency or organization through which an influence operation may create, develop, and host content and narratives. Owned media assets include websites, blogs, social media pages, forums, and other platforms that facilitate the creation and organization of content. -TA06 - - -T0039 -Prepare fundraising campaigns -Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns (see: Develop Information Pathways) to promote operation messaging while raising money to support its activities. -TA06 +T0039 +Bait legitimate influencers +Credibility in a social media environment is often a function of the size of a user's network. "Influencers" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. By targeting high-influence people and organizations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders. +TA08 T0040 -Leverage Content Farm - -TA06 - - -T0041 -Compromise legitimate accounts -Hack or take over legimate accounts to distribute misinformation or damaging content. -TA07 +Demand insurmountable proof +Campaigns often leverage tactical and informational asymmetries on the threat surface, as seen in the Distort and Deny strategies, and the "firehose of misinformation". Specifically, conspiracy theorists can be repeatedly wrong, but advocates of the truth need to be perfect. By constantly escalating demands for proof, propagandists can effectively leverage this asymmetry while also priming its future use, often with an even greater asymmetric advantage. The conspiracist is offered freer rein for a broader range of "questions" while the truth teller is burdened with higher and higher standards of proof. +TA14 T0042 -Create fake experts -Stories planted or promoted in computational propaganda operations often make use of experts fabricated from whole cloth, sometimes specifically for the story itself. -TA07 +Seed Kernel of truth +Wrap lies or altered context/facts around truths. Influence campaigns pursue a variety of objectives with respect to target audiences, prominent among them: 1. undermine a narrative commonly referenced in the target audience; or 2. promote a narrative less common in the target audience, but preferred by the attacker. In both cases, the attacker is presented with a heavy lift. They must change the relative importance of various narratives in the interpretation of events, despite contrary tendencies. When messaging makes use of factual reporting to promote these adjustments in the narrative space, they are less likely to be dismissed out of hand; when messaging can juxtapose a (factual) truth about current affairs with the (abstract) truth explicated in these narratives, propagandists can undermine or promote them selectively. Context matters. +TA08 T0043 -Create personas - +Chat apps +Direct messaging via chat app is an increasing method of delivery. These messages are often automated and new delivery and storage methods make them anonymous, viral, and ephemeral. This is a difficult space to monitor, but also a difficult space to build acclaim or notoriety. TA07 T0044 -Establish Inauthentic News Sites -Modern computational propaganda makes use of a cadre of imposter news sites spreading globally. These sites, sometimes motivated by concerns other than propaganda--for instance, click-based revenue--often have some superficial markers of authenticity, such as naming and site-design. But many can be quickly exposed with reference to their owenership, reporting history and adverstising details. -TA07 +Seed distortions +Try a wide variety of messages in the early hours surrounding an incident or event, to give a misleading account or impression. +TA08 T0045 -Prepare Assets Impersonating Legitimate Entities -An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities. -An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entity’s website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct. -TA07 +Use fake experts +Use the fake experts that were set up during Establish Legitimacy. Pseudo-experts are disposable assets that often appear once and then disappear. Give "credility" to misinformation. Take advantage of credential bias +TA08 T0046 +Use Search Engine Optimization +Manipulate content engagement metrics (ie: Reddit & Twitter) to influence/impact news search results (e.g. Google), also elevates RT & Sputnik headline into Google news alert emails. aka "Black-hat SEO" +TA08 + + +T0047 +Censor social media as a political force +Use political influence or the power of state to stop critical social media comments. Government requested/driven content take downs (see Google Transperancy reports). +TA18 + + +T0048 +Harass +Threatening or harassing believers of opposing narratives refers to the use of intimidation techniques, including cyberbullying and doxing, to discourage opponents from voicing their dissent. An influence operation may threaten or harass believers of the opposing narratives to deter individuals from posting or proliferating conflicting content. +TA18 + + +T0049 +Flooding the Information Space +Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect. +TA17 + + +T0057 +Organize Events +Coordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives. +TA10 + + +T0059 +Play the long game +Play the long game refers to two phenomena: 1. To plan messaging and allow it to grow organically without conducting your own amplification. This is methodical and slow and requires years for the message to take hold 2. To develop a series of seemingly disconnected messaging narratives that eventually combine into a new narrative. +TA11 + + +T0060 +Continue to Amplify +continue narrative or message amplification after the main incident work has finished +TA11 + + +T0061 +Sell Merchandise +Sell mechandise refers to getting the message or narrative into physical space in the offline world while making money +TA10 + + +T0065 +Prepare Physical Broadcast Capabilities +Create or coopt broadcast capabilities (e.g. TV, radio etc). +TA15 + + +T0066 +Degrade Adversary +Plan to degrade an adversary’s image or ability to act. This could include preparation and use of harmful information about the adversary’s actions or reputation. +TA02 + + +T0068 +Respond to Breaking News Event or Active Crisis +Media attention on a story or event is heightened during a breaking news event, where unclear facts and incomplete information increase speculation, rumors, and conspiracy theories, which are all vulnerable to manipulation. +TA14 + + +T0072 +Segment Audiences +Create audience segmentations by features of interest to the influence campaign, including political affiliation, geographic location, income, demographics, and psychographics. +TA13 + + +T0073 +Determine Target Audiences +tbd +TA01 + + +T0074 +Determine Strategic Ends +tbd +TA01 + + +T0075 +Dismiss +Push back against criticism by dismissing your critics. This might be arguing that the critics use a different standard for you than with other actors or themselves; or arguing that their criticism is biased. +TA02 + + +T0076 +Distort +Twist the narrative. Take information, or artifacts like images, and change the framing around them. +TA02 + + +T0077 +Distract +Shift attention to a different narrative or actor, for instance by accusing critics of the same activity that they’ve accused you of (e.g. police brutality). +TA02 + + +T0078 +Dismay +Threaten the critic or narrator of events. For instance, threaten journalists or news outlets reporting on a story. +TA02 + + +T0079 +Divide +Create conflict between subgroups, to widen divisions in a community +TA02 + + +T0080 +Map Target Audience Information Environment +Mapping the target audience information environment analyzes the information space itself, including social media analytics, web traffic, and media surveys. Mapping the information environment may help the influence operation determine the most realistic and popular information channels to reach its target audience. +Mapping the target audience information environment aids influence operations in determining the most vulnerable areas of the information space to target with messaging. +TA13 + + +T0081 +Identify Social and Technical Vulnerabilities +Identifying social and technical vulnerabilities determines weaknesses within the target audience information environment for later exploitation. Vulnerabilities include decisive political issues, weak cybersecurity infrastructure, search engine data voids, and other technical and non technical weaknesses in the target information environment. +Identifying social and technical vulnerabilities facilitates the later exploitation of the identified weaknesses to advance operation objectives. +TA13 + + +T0082 +Develop New Narratives +tbd +TA14 + + +T0083 +Integrate Target Audience Vulnerabilities into Narrative +An influence operation may seek to exploit the preexisting weaknesses, fears, and enemies of the target audience for integration into the operation’s narratives and overall strategy. Integrating existing vulnerabilities into the operational approach conserves resources by exploiting already weak areas of the target information environment instead of forcing the operation to create new vulnerabilities in the environment. +TA14 + + +T0084 +Reuse Existing Content +When an operation recycles content from its own previous operations or plagiarizes from external operations. An operation may launder information to conserve resources that would have otherwise been utilized to develop new content. +TA06 + + +T0085 +Develop Text-based Content +tbd +TA06 + + +T0086 +Develop Image-based Content +tbd +TA06 + + +T0087 +Develop Video-based Content +tbd +TA06 + + +T0088 +Develop Audio-based Content +tbd +TA06 + + +T0089 +Obtain Private Documents +tbd +TA06 + + +T0090 +Create Inauthentic Accounts +tbd +TA15 + + +T0091 +Recruit bad actors +tbd +TA15 + + +T0092 +Build Network +tbd +TA15 + + +T0093 +Acquire/ recruit Network +tbd +TA15 + + +T0094 +Infiltrate Existing Networks +tbd +TA15 + + +T0095 +Develop Owned Media Assets +An owned media asset refers to an agency or organization through which an influence operation may create, develop, and host content and narratives. Owned media assets include websites, blogs, social media pages, forums, and other platforms that facilitate the creation and organization of content. +TA15 + + +T0096 +Leverage Content Farm +tbd +TA15 + + +T0097 +Create personas +tbd +TA16 + + +T0098 +Establish Inauthentic News Sites +Modern computational propaganda makes use of a cadre of imposter news sites spreading globally. These sites, sometimes motivated by concerns other than propaganda--for instance, click-based revenue--often have some superficial markers of authenticity, such as naming and site-design. But many can be quickly exposed with reference to their owenership, reporting history and adverstising details. +TA16 + + +T0099 +Prepare Assets Impersonating Legitimate Entities +An influence operation may prepare assets impersonating legitimate entities to further conceal its network identity and add a layer of legitimacy to its operation content. Users will more likely believe and less likely fact-check news from recognizable sources rather than unknown sites. Legitimate entities may include authentic news outlets, public figures, organizations, or state entities. +An influence operation may use a wide variety of cyber techniques to impersonate a legitimate entity’s website or social media account. Typosquatting87 is the international registration of a domain name with purposeful variations of the impersonated domain name through intentional typos, top-level domain (TLD) manipulation, or punycode. Typosquatting facilitates the creation of falsified websites by creating similar domain names in the URL box, leaving it to the user to confirm that the URL is correct. +TA16 + + +T0100 Co-opt Trusted Sources An influence operation may co-opt trusted sources by infiltrating or repurposing a source to reach a target audience through existing, previously reliable networks. Co-opted trusted sources may include: - National or local new outlets - Research or academic publications - Online blogs or websites +TA16 + + +T0101 +Create Localized Content +Localized content refers to content that appeals to a specific community of individuals, often in defined geographic areas. An operation may create localized content using local language and dialects to resonate with its target audience and blend in with other local news and social media. Localized content may help an operation increase legitimacy, avoid detection, and complicate external attribution. +TA05 + + +T0102 +Leverage Echo Chambers/Filter Bubbles +An echo chamber refers to an internet subgroup, often along ideological lines, where individuals only engage with “others with which they are already in agreement.” A filter bubble refers to an algorithm's placement of an individual in content that they agree with or regularly engage with, possibly entrapping the user into a bubble of their own making. An operation may create these isolated areas of the internet by match existing groups, or aggregating individuals into a single target audience based on shared interests, politics, values, demographics, and other characteristics. Echo chambers and filter bubbles help to reinforce similar biases and content to the same target audience members. +TA05 + + +T0103 +Livestream +tbd TA07 -T0047 -Create Clickbait -Create attention grabbing headlines (outrage, doubt, humor) required to drive traffic & engagement. This is a key asset. -TA08 +T0104 +Social Networks +tbd +TA07 -T0048 -Purchase Targeted Advertisements -Create or fund advertisements targeted at specific populations -TA08 - - -T0049 -Create Localized Content -Localized content refers to content that appeals to a specific community of individuals, often in defined geographic areas. An operation may create localized content using local language and dialects to resonate with its target audience and blend in with other local news and social media. Localized content may help an operation increase legitimacy, avoid detection, and complicate external attribution. -TA08 - - -T0050 -Leverage Echo Chambers/Filter Bubbles -An echo chamber refers to an internet subgroup, often along ideological lines, where individuals only engage with “others with which they are already in agreement.” A filter bubble refers to an algorithm's placement of an individual in content that they agree with or regularly engage with, possibly entrapping the user into a bubble of their own making. An operation may create these isolated areas of the internet by match existing groups, or aggregating individuals into a single target audience based on shared interests, politics, values, demographics, and other characteristics. Echo chambers and filter bubbles help to reinforce similar biases and content to the same target audience members. -TA08 - - -T0051 -Chat apps -Direct messaging via chat app is an increasing method of delivery. These messages are often automated and new delivery and storage methods make them anonymous, viral, and ephemeral. This is a difficult space to monitor, but also a difficult space to build acclaim or notoriety. -TA09 - - -T0052 -Livestream - -TA09 - - -T0053 - Social Networks - -TA09 - - -T0054 +T0105 Media Sharing Networks Media sharing networks refer to services whose primary function is the hosting and sharing of specific forms of media. Examples include Instagram, Snapchat, TikTok, Youtube, SoundCloud. -TA09 +TA07 -T0055 +T0106 Discussion Forums Platforms for finding, discussing, and sharing information and opinions. Examples include Reddit, Quora, Digg, message boards, interest-based discussion forums, etc. -TA09 +TA07 -T0056 +T0107 Bookmarking and Content Curation Platforms for searching, sharing, and curating content and media. Examples include Pinterest, Flipboard, etc. -TA09 +TA07 -T0057 +T0108 Blogging and Publishing Networks Examples include WordPress, Blogger, Weebly, Tumblr, Medium, etc. -TA09 +TA07 -T0058 +T0109 Consumer Review Networks Platforms for finding, reviewing, and sharing information about brands, products, services, restaurants, travel destinations, etc. Examples include Yelp, TripAdvisor, etc. -TA09 +TA07 -T0059 -Online polls -Create fake online polls, or manipulate existing online polls. Data gathering tactic to target those who engage, and potentially their networks of friends/followers as well -TA09 - - -T0060 +T0110 Formal Diplomatic Channels - -TA09 +tbd +TA07 -T0061 +T0111 Traditional Media Examples include TV, Newspaper, Radio, etc. -TA09 +TA07 -T0062 +T0112 Email - -TA09 +tbd +TA07 -T0063 -Trial content -Iteratively test incident performance (messages, content etc), e.g. A/B test headline/content enagagement metrics; website and/or funding campaign conversion rates -TA10 - - -T0064 -Bait legitimate influencers -Credibility in a social media environment is often a function of the size of a user's network. "Influencers" are so-called because of their reach, typically understood as: 1) the size of their network (i.e. the number of followers, perhaps weighted by their own influence); and 2) The rate at which their comments are re-circulated (these two metrics are related). Add traditional media players at all levels of credibility and professionalism to this, and the number of potential influencial carriers available for unwitting amplification becomes substantial. By targeting high-influence people and organizations in all types of media with narratives and content engineered to appeal their emotional or ideological drivers, influence campaigns are able to add perceived credibility to their messaging via saturation and adoption by trusted agents such as celebrities, journalists and local leaders. -TA10 - - -T0065 -Seed Kernel of truth -Wrap lies or altered context/facts around truths. Influence campaigns pursue a variety of objectives with respect to target audiences, prominent among them: 1. undermine a narrative commonly referenced in the target audience; or 2. promote a narrative less common in the target audience, but preferred by the attacker. In both cases, the attacker is presented with a heavy lift. They must change the relative importance of various narratives in the interpretation of events, despite contrary tendencies. When messaging makes use of factual reporting to promote these adjustments in the narrative space, they are less likely to be dismissed out of hand; when messaging can juxtapose a (factual) truth about current affairs with the (abstract) truth explicated in these narratives, propagandists can undermine or promote them selectively. Context matters. -TA10 - - -T0066 -Seed distortions -Try a wide variety of messages in the early hours surrounding an incident or event, to give a misleading account or impression. -TA10 - - -T0067 -Use fake experts -Use the fake experts that were set up during Establish Legitimacy. Pseudo-experts are disposable assets that often appear once and then disappear. Give "credility" to misinformation. Take advantage of credential bias -TA10 - - -T0068 -Use Search Engine Optimization -Manipulate content engagement metrics (ie: Reddit & Twitter) to influence/impact news search results (e.g. Google), also elevates RT & Sputnik headline into Google news alert emails. aka "Black-hat SEO" -TA10 - - -T0069 +T0113 Employ Commercial Analytic Firms Commercial analytic firms collect data on target audience activities and evaluate the data to detect trends, such as content receiving high click-rates. An influence operation may employ commercial analytic firms to facilitate external collection on its target audience, complicating attribution efforts and better tailoring the content to audience preferences. +TA08 + + +T0114 +Deliver Ads +Delivering content via any form of paid media or advertising. +TA09 + + +T0115 +Post Content +Delivering content by posting via owned media (assets that the operator controls). +TA09 + + +T0116 +Comment or Reply on Content +Delivering content by replying or commenting via owned media (assets that the operator controls). +TA09 + + +T0117 +Attract Traditional Media +Deliver content by attracting the attention of traditional media (earned media). +TA09 + + +T0118 +Amplify Existing Narrative +An influence operation may amplify existing narratives that align with its narratives to support operation objectives. +TA17 + + +T0119 +Cross-Posting +Cross-posting refers to posting the same message to multiple internet discussions, social media platforms or accounts, or news groups at one time. An influence operation may post content online in multiple communities and platforms to increase the chances of content exposure to the target audience. +TA17 + + +T0120 +Incentivize Sharing +Incentivizing content sharing refers to actions that encourage users to share content themselves, reducing the need for the operation itself to post and promote its own content. +TA17 + + +T0121 +Manipulate Platform Algorithm +Manipulating a platform algorithm refers to conducting activity on a platform in a way that intentionally targets its underlying algorithm. After analyzing a platform’s algorithm (see: Select Platforms), an influence operation may use a platform in a way that increases its content exposure, avoids content removal, or otherwise benefits the operation’s strategy. For example, an influence operation may use bots to amplify its posts so that the platform’s algorithm recognizes engagement with operation content and further promotes the content on user timelines. +TA17 + + +T0122 +Direct Users to Alternative Platforms +Direct users to alternative platforms refers to encouraging users to move from the platform on which they initially viewed operation content and engage with content on alternate information channels, including separate social media channels and inauthentic websites. An operation may drive users to alternative platforms to diversify its information channels and ensure the target audience knows where to access operation content if the initial platform suspends, flags, or otherwise removes original operation assets and content. +TA17 + + +T0123 +Control Information Environment through Offensive Cyberspace Operations +Controling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritize operation messaging or block opposition messaging. +TA18 + + +T0124 +Suppress Opposition +tbd +TA18 + + +T0125 +Platform Filtering +Platform filtering refers to the decontextualization of information as claims cross platforms (from Joan Donovan https://www.hks.harvard.edu/publications/disinformation-design-use-evidence-collages-and-platform-filtering-media-manipulation) +TA18 + + +T0126 +Encourage Attendance at Events +Operation encourages attendance at existing real world event. TA10 -T0070 -Deliver Ads -Delivering content via any form of paid media or advertising. -TA11 - - -T0071 -Post Content -Delivering content by posting via owned media (assets that the operator controls). -TA11 - - -T0072 -Comment or Reply on Content -Delivering content by replying or commenting via owned media (assets that the operator controls). -TA11 - - -T0073 -Attract Traditional Media -Deliver content by attracting the attention of traditional media (earned media). -TA11 - - -T0074 -Flooding the Information Space -Flooding and/or mobbing social media channels feeds and/or hashtag with excessive volume of content to control/shape online conversations and/or drown out opposing points of view. Bots and/or patriotic trolls are effective tools to acheive this effect. -TA12 - - -T0075 -Amplify Existing Narrative -An influence operation may amplify existing narratives that align with its narratives to support operation objectives. -TA12 - - -T0076 -Cross-Posting -Cross-posting refers to posting the same message to multiple internet discussions, social media platforms or accounts, or news groups at one time. An influence operation may post content online in multiple communities and platforms to increase the chances of content exposure to the target audience. -TA12 - - -T0077 -Incentivize Sharing -Incentivizing content sharing refers to actions that encourage users to share content themselves, reducing the need for the operation itself to post and promote its own content. -TA12 - - -T0078 -Manipulate Platform Algorithm -Manipulating a platform algorithm refers to conducting activity on a platform in a way that intentionally targets its underlying algorithm. After analyzing a platform’s algorithm (see: Select Platforms), an influence operation may use a platform in a way that increases its content exposure, avoids content removal, or otherwise benefits the operation’s strategy. For example, an influence operation may use bots to amplify its posts so that the platform’s algorithm recognizes engagement with operation content and further promotes the content on user timelines. -TA12 - - -T0079 -Direct Users to Alternative Platforms -Direct users to alternative platforms refers to encouraging users to move from the platform on which they initially viewed operation content and engage with content on alternate information channels, including separate social media channels and inauthentic websites. An operation may drive users to alternative platforms to diversify its information channels and ensure the target audience knows where to access operation content if the initial platform suspends, flags, or otherwise removes original operation assets and content. -TA12 - - -T0080 -Harass -Threatening or harassing believers of opposing narratives refers to the use of intimidation techniques, including cyberbullying and doxing, to discourage opponents from voicing their dissent. An influence operation may threaten or harass believers of the opposing narratives to deter individuals from posting or proliferating conflicting content. -TA13 - - -T0081 -Censor social media as a political force -Use political influence or the power of state to stop critical social media comments. Government requested/driven content take downs (see Google Transperancy reports). -TA13 - - -T0082 -Control Information Environment through Offensive Cyberspace Operations -Controling the information environment through offensive cyberspace operations uses cyber tools and techniques to alter the trajectory of content in the information space to either prioritize operation messaging or block opposition messaging. -TA13 - - -T0083 -Suppress Opposition - -TA13 - - -T0084 -Platform Filtering -Platform filtering refers to the decontextualization of information as claims cross platforms (from Joan Donovan https://www.hks.harvard.edu/publications/disinformation-design-use-evidence-collages-and-platform-filtering-media-manipulation) -TA13 - - -T0085 -Encourage Attendance at Events -Operation encourages attendance at existing real world event. -TA14 - - -T0086 -Organize Events -Coordinate and promote real-world events across media platforms, e.g. rallies, protests, gatherings in support of incident narratives. -TA14 - - -T0087 -Conduct fundraising -Fundraising campaigns refer to an influence operation’s systematic effort to seek financial support for a charity, cause, or other enterprise using online activities that further promote operation information pathways while raising a profit. Many influence operations have engaged in crowdfunding services166 on platforms including Tipee, Patreon, and GoFundMe. An operation may use its previously prepared fundraising campaigns to promote operation messaging while raising money to support its activities. -TA14 - - -T0088 +T0127 Physical Violence Physical violence refers to the use of force to injure, abuse, damage, or destroy. An influence operation may conduct or encourage physical violence to discourage opponents from promoting conflicting content or draw attention to operation narratives using shock value. -TA14 +TA10 -T0089 -Merchandising/ Advertising -Merchandising/Advertising refers to getting the message or narrative into physical space in the offline world -TA14 - - -T0090 +T0128 Conceal People Conceal the identity or provenance of the account and people assets. -TA15 +TA11 -T0091 +T0129 Conceal Operational Activity - -TA15 +tbd +TA11 -T0092 +T0130 Conceal Infrastructure - -TA15 +tbd +TA11 -T0093 +T0131 Exploit TOS/Content Moderation - -TA15 +tbd +TA11 -T0094 -Play the long game -Play the long game refers to two phenomena: 1. To plan messaging and allow it to grow organically without conducting your own amplification. This is methodical and slow and requires years for the message to take hold 2. To develop a series of seemingly disconnected messaging narratives that eventually combine into a new narrative. -TA15 - - -T0095 +T0132 Measure Performance - -TA16 +tbd +TA12 -T0096 +T0133 Measure Effectiveness - -TA16 +tbd +TA12 -T0097 +T0134 Measure Effectiveness Indicators (or KPIs) - -TA16 +tbd +TA12