RFC-0012: ATX-1 v2.0 Taxonomy Normalization

RFC: RFC-0012
Status: Implemented
Version: 1.0.0
Created: 2026-03-26
Updated: 2026-03-26
Author: Ken Tannenbaum, AEGIS Initiative / AEGIS Operations LLC
Repository: aegis-governance, aegis-docs
Target milestone: Q1 2026
Supersedes: ATX-1 v1.0 (docs/atx/ATX-1_TECHNIQUE_TAXONOMY.md)
Superseded by: None\


Summary

This RFC proposes a normalization of the ATX-1 threat taxonomy from v1.0 to v2.0, addressing structural issues identified during peer feedback and independent review. The changes enforce strict tactic purity (intent-only), add a primitives layer, eliminate category overlap, and expand technique coverage based on corroborating research.

ATX-1 v1.0 remains frozen and citable via its published DOIs. v2.0 is published as a new version alongside v1.0, not as a replacement.


Motivation

ATX-1 v1.0 was published with 9 tactics and 20 techniques, empirically grounded in the Agents of Chaos study and corroborated by three independent research groups. While v1.0 is structurally sound for its intended purpose (a dataset descriptor), independent taxonomy review identified several normalization issues that limit its extensibility and alignment with MITRE conventions:

  1. Tactic purity. Some tactics mix intent with outcome or environment. “Destructive Action” is an outcome, not an intent. “Multi-Agent” is an environment, not an intent. “Info Breach” is an outcome.

  2. Missing primitives layer. v1.0 has root causes (RC1–RC4) but no formal mapping between system primitives and tactics. This limits formal reasoning and automation.

  3. State integrity fragmented. False completion reports (TA005), silent failures (TA009), and governance state corruption (TA008) are all manifestations of state divergence but are scattered across three tactics.

  4. Multi-agent behavior under-modeled. TA007 has only 2 techniques but the corroborating literature identifies at least 3 distinct failure classes (identity spoofing, delegation injection, behavioral contagion).

  5. Technique overlap. Some techniques (e.g., T3001 Autonomous Scope Expansion and T6001 Recursive Self-Invocation) can collide in real systems without clear boundary definitions.


Guide-Level Explanation

ATX-1 v2.0 is a structural normalization of the threat taxonomy. For practitioners:

v1.0 remains frozen at its published DOIs. v2.0 is a new publication, not a replacement.


Reference-Level Explanation

Primitives Layer (NEW)

Every tactic maps to one or more system primitives — the architectural concepts that the tactic exploits:

PrimitiveDescription
AuthorityWho is allowed to issue instructions
IdentityHow agents represent self and other actors
DelegationTask decomposition across agents or subsystems
StateInternal vs external system truth
MemoryPersistence across steps, sessions, or contexts
Tool AccessInterface to infrastructure (APIs, files, shell, network)
CoordinationInter-agent communication and alignment
Resource ControlCompute, storage, network, API consumption
ObservabilityMonitoring, logging, and audit surfaces

Tactic Restructure (v1.0 → v2.0)

All tactics normalized to intent — what the agent is trying to achieve (explicitly or emergently).

v2.0 IDv2.0 TacticPrimitivesv1.0 Origin
TA001Violate Authority BoundariesAuthority, IdentityTA001 (renamed)
TA002Exceed Operational ScopeDelegation, Objective ControlTA003 (renamed + absorbed T2003)
TA003Compromise System IntegrityState, EnvironmentTA002 (renamed, outcome→intent)
TA004Expose or Exfiltrate InformationMemory, Context, Data BoundariesTA004 (renamed)
TA005Violate State IntegrityState, ObservabilityNEW (consolidates TA005 + parts of TA008/TA009)
TA006Abuse Resource AllocationResource ControlTA006 (renamed)
TA007Manipulate Agent InteractionsCoordination, IdentityTA007 (renamed from “Multi-Agent”)
TA008Establish or Modify PersistenceMemory, Governance StateTA008 (refined)
TA009Evade Detection or OversightObservability, Control PlanesTA009 (refined, T9001 moved to TA005)

Technique Mapping (v1.0 → v2.0)

v2.0 IDv2.0 Techniquev1.0 OriginChange
T1001Execute Non-Owner InstructionT1001Renamed for verb-object consistency
T1002Infer Implicit AuthorityT1002Renamed
T1003Propagate Spoofed Authority at ScaleT1003Renamed
T2001Expand Task Scope AutonomouslyT3001Moved from TA003→TA002, renamed
T2002Perform Unvalidated Bulk OperationsT2003Moved from TA002→TA002, renamed
T2003Obscure Objective Through DelegationNEWFrom corroborating literature [Arora et al., Ko et al., Reid et al.]
T3001Perform Irreversible Destructive ActionT2001Moved from TA002→TA003, renamed
T3002Trigger Cascading System ChangesT2002Moved from TA002→TA003, renamed
T4001Exfiltrate Context-Scoped DataT4001Renamed
T4002Leak Cross-Session or Persistent DataT4002Renamed
T5001Report False Task CompletionT5001Moved from TA005→TA005 (new tactic)
T5002Fabricate Action AttributionT5002Moved from TA005→TA005 (new tactic)
T5003Suppress or Omit Execution FailureT9001Moved from TA009→TA005
T6001Execute Recursive Invocation LoopsT6001Renamed
T6002Consume Unbounded External ResourcesT6002Renamed
T7001Spoof Agent IdentityT7001Renamed
T7002Inject Malicious Delegation ChainsT7002Renamed
T7003Induce Cross-Agent Behavioral DriftNEWFrom corroborating literature [Reid et al., Ko et al.]
T8001Poison Persistent MemoryT8001Renamed
T8002Corrupt Governance or Policy StateT8002Renamed
T9001Operate Outside Monitoring BoundariesNEWRefined from old T9001 concept
T9002Obfuscate Action TraceabilityNEWFrom corroborating literature [Arora et al.]

Total: 9 tactics, 22 techniques (was 9 tactics, 20 techniques)

Naming Convention

All techniques now follow verb-object format:

This aligns with MITRE ATT&CK naming conventions and improves testability.

Revision Actions (Post-Initial Review)

The following refinements were identified during review and are incorporated:

R1: Strengthen Tool Invocation Clarity — Update TA002 and TA003 definitions to explicitly include tool-mediated actions.

R2: Add Delegation Obfuscation Technique — New technique T2003 under TA002. Maps to ATM-1 AV-2.2 and AV-7.1.

R3: Formalize State vs Observability Distinction — TA005 focuses on correctness of reported state vs actual state; TA009 focuses on visibility within monitoring, logging, and audit systems.

R4: Add Observability Acceptance Criterion — Each technique must map to at least one ATM-1 detection signal, audit event, or measurable state transition.

R5: Add ATX-1 ↔ ATM-1 Mapping Section — Published as a first-class artifact (atx-1-atm1-mapping.json).

R6: Establish Mapping as First-Class Artifact — ATX Technique → ATM Attack Vector → ATM Controls → ATM Detection Signals.

R7: Align Delegation with ATM-1 — T2003 aligns with ATM-1 AV-2.2 and AV-7.1.

R8: Ensure Primitive-to-Tactic Integrity — Every tactic maps to at least one primitive.

Identified ATM-1 Coverage Gaps

The ATX ↔ ATM mapping reveals three significant gaps requiring ATM-1 enhancement:

GapTechniquesMissing
State IntegrityT5001 (false completion), T5003 (silent failure)No execution verification control; no failure transparency enforcement
Memory/PersistenceT8001 (memory poisoning)Memory integrity not explicitly modeled in ATM-1
Resource EnforcementT6002 (unbounded resources)Lacks explicit quota enforcement control

These gaps become ATM-1 enhancement proposals in a future RFC.

Companion Artifacts

ArtifactFileDescription
ATX-1 ↔ ATM-1 Mappingatx-1-atm1-mapping.jsonMachine-readable mapping of all 22 techniques to ATM-1 vectors, controls, and detection signals with coverage assessment
Coverage SummaryDerived from mappingfull (10), partial (7), gap (3) across 22 techniques

Drawbacks

  1. Breaking IDs — Technique IDs change for moved techniques, requiring all downstream consumers (STIX bundles, navigator layers, documentation) to be regenerated simultaneously.

  2. Citation fragmentation — v1.0 is already cited in the IEEE Data Descriptions submission. v2.0 introduces a second citable version, potentially confusing references.

  3. Churn — Renaming all 9 tactics and all techniques is a significant change for a taxonomy that was only recently published. Early adopters must update.


Alternatives Considered

  1. Incremental fixes to v1.0 — Rejected because the tactic purity and overlap issues are structural. Patching individual techniques without fixing the tactic layer would create inconsistency.

  2. Additive-only v1.1 — Add new techniques without renaming or restructuring. Rejected because the naming inconsistency (mixed noun/verb formats) and tactic impurity would persist.

  3. Wait for broader community feedback — Rejected because the structural issues were clear from independent review and delaying would compound the downstream update burden.


Compatibility


Implementation Notes

Impact Assessment

What changes:

What does NOT change:

Versioning Strategy

Timeline

  1. Phase 1: RFC review and acceptance
  2. Phase 2: Regenerate all machine-readable artifacts + ATX↔ATM mapping
  3. Phase 3: Update aegis-docs.com and aegis-governance.com
  4. Phase 4: Publish new DOIs, update PUBLICATIONS.md
  5. Phase 5: LinkedIn announcement

Open Questions


Success Criteria


References


AEGIS™ | “Capability without constraint is not intelligence”™
AEGIS Initiative — AEGIS Operations LLC