Design & Philosophy: Overview

The following resources detail the philosophy, design principles, and versioning approach that underpin the AMLTRIX framework. They’re not the taxonomies themselves, but explain how each taxonomy was conceptualized, structured, and maintained for maximum clarity and adaptability.


1. Core Adversarial Model

AMLTRIX Design: Kill-chain, Tactics & Techniques

Explore how AMLTRIX segments illicit behavior into Tactics (the “why”) and Techniques (the “how”), drawing on kill-chain philosophies from cybersecurity. This page clarifies why these categories exist, how they’re intended to be used, and what design choices shape their definitions.


2. Supplemental Methodology for Extended Taxonomies

These pages document the conceptual and methodological underpinnings for additional AMLTRIX categories—explaining why they exist and how they were designed.

Risks

Gain insight into why AMLTRIX defines product, channel, and jurisdictional risks the way it does. Understand the rationale behind each risk category and the thinking that shaped these definitions.

Mitigations

Learn how recommended controls (M####) are documented in AMLTRIX and why these categories facilitate linking each adversarial Technique with specific preventative or detective measures.

Services & Products

Learn how AMLTRIX conceptualizes the various financial offerings that criminals misuse, from basic checking accounts to complex trade finance lines. This page explains the design choices behind labeling each service in the knowledge base.

Actors

Learn why AMLTRIX depicts illicit actors, financial institutions, employees, or other roles as discrete “Actors.” The methodology pages describe the core logic behind these classifications, ensuring consistent modeling of who’s involved in laundering schemes.

Value Instruments

Learn how AMLTRIX designates mediums (cash, crypto, etc.) as “Value Instruments,” and why these definitions help institutions trace the flow of illicit funds across distinct forms of value.

Data Sources

Learn what led AMLTRIX to define various logs and record types (KYC data, transaction logs, watchlists) as data sources—explaining the conceptual approach behind this classification.


3. Versioning & Maintenance

Versioning

Read how AMLTRIX manages updates to Tactics, Techniques, or Indicators—maintaining backward compatibility while staying current with evolving threats. This page clarifies the version numbering, release cadence, and ongoing maintenance approach so you can keep track of relevant changes.


Next Steps

  • Dive into the Adversarial Model: See the kill-chain philosophy behind Tactics & Techniques, clarifying why AMLTRIX groups behaviors the way it does.
  • Examine Supplemental Methodologies: Understand the design reasoning for how Risks, Actors, or Mitigations are framed, ensuring consistent modeling across the knowledge base.
  • Stay Current: Familiarize yourself with the Versioning principles to know how and when AMLTRIX evolves.