Skip to content

Commit

Permalink
Merge pull request #911 from MISP/fix/duplicates
Browse files Browse the repository at this point in the history
fix: [disarm] drop duplicate values
  • Loading branch information
cvandeplas authored Dec 21, 2023
2 parents 3b50d7a + bbe7b95 commit 645b3ae
Show file tree
Hide file tree
Showing 3 changed files with 0 additions and 81 deletions.
26 changes: 0 additions & 26 deletions clusters/disarm-countermeasures.json
Original file line number Diff line number Diff line change
Expand Up @@ -2231,32 +2231,6 @@
"uuid": "b8b49628-4c3d-528c-90f1-2fee8722e2c5",
"value": "Tool transparency and literacy for channels people follow."
},
{
"description": "Beware: content moderation misused becomes censorship.",
"meta": {
"external_id": "C00122",
"kill_chain": [
"tactics:Deliver Content",
"responsetypes:Deny",
"metatechniques:Friction"
],
"refs": [
"https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/counters/C00122.md"
]
},
"related": [
{
"dest-uuid": "56b88516-ae4c-5176-b6ed-6e9be91ce898",
"type": "blocks"
},
{
"dest-uuid": "667967b8-b3f1-55ad-8f8a-8c43c1290e6e",
"type": "affected-by"
}
],
"uuid": "0b0f003a-4bb7-5f1e-8bc6-987c680cba39",
"value": "Content moderation"
},
{
"description": "reduce the visibility of known botnets online.",
"meta": {
Expand Down
25 changes: 0 additions & 25 deletions clusters/disarm-detections.json
Original file line number Diff line number Diff line change
Expand Up @@ -1936,31 +1936,6 @@
"uuid": "76efcfa4-6214-58b7-8557-60b77f36ef63",
"value": "Model for bot account behaviour"
},
{
"description": "All techniques benefit from careful analysis and monitoring of activities on social network.",
"meta": {
"external_id": "F00078",
"kill_chain": [
"tactics:Establish Social Assets",
"responsetypes:Detect"
],
"refs": [
"https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/detections/F00078.md"
]
},
"related": [
{
"dest-uuid": "97ff79d9-55d2-550a-8a10-459cad7822fb",
"type": "detects"
},
{
"dest-uuid": "bd7a51b3-d00c-575f-a16e-6f51e5a67743",
"type": "detected-by"
}
],
"uuid": "2032a145-fc97-52f2-9f3a-15badd5df9da",
"value": "Monitor account level activity in social networks"
},
{
"description": "",
"meta": {
Expand Down
30 changes: 0 additions & 30 deletions clusters/disarm-techniques.json
Original file line number Diff line number Diff line change
Expand Up @@ -3213,21 +3213,6 @@
"uuid": "9c655aa6-1474-5ab9-8eff-519df00fe41b",
"value": "Social Media"
},
{
"description": "Examples include TV, Radio, Newspaper, billboards",
"meta": {
"external_id": "T0114.002",
"kill_chain": [
"tactics:Deliver Content"
],
"refs": [
"https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0114.002.md"
]
},
"related": [],
"uuid": "29640d07-bfc9-5d0a-a7ac-34dbd8141410",
"value": "Traditional Media"
},
{
"description": "Delivering content by posting via owned media (assets that the operator controls).",
"meta": {
Expand Down Expand Up @@ -3843,21 +3828,6 @@
"uuid": "7c57a7c5-28eb-550d-bdf5-12be2396acb7",
"value": "Conceal Operational Activity"
},
{
"description": "Concealing network identity aims to hide the existence an influence operation’s network completely. Unlike concealing sponsorship, concealing network identity denies the existence of any sort of organisation.",
"meta": {
"external_id": "T0129.001",
"kill_chain": [
"tactics:Persist in the Information Environment"
],
"refs": [
"https://github.com/DISARMFoundation/DISARMframeworks/blob/main/generated_pages/techniques/T0129.001.md"
]
},
"related": [],
"uuid": "dab70ef3-f926-5288-b165-384fad15336d",
"value": "Conceal Network Identity"
},
{
"description": "An influence operation may mix its own operation content with legitimate news or external unrelated content to disguise operational objectives, narratives, or existence. For example, an operation may generate \"lifestyle\" or \"cuisine\" content alongside regular operation content.",
"meta": {
Expand Down

0 comments on commit 645b3ae

Please sign in to comment.