txt2stix 0.0.4__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (119) hide show
  1. txt2stix/__init__.py +33 -0
  2. txt2stix/ai_extractor/__init__.py +15 -0
  3. txt2stix/ai_extractor/anthropic.py +12 -0
  4. txt2stix/ai_extractor/base.py +87 -0
  5. txt2stix/ai_extractor/deepseek.py +19 -0
  6. txt2stix/ai_extractor/gemini.py +18 -0
  7. txt2stix/ai_extractor/openai.py +15 -0
  8. txt2stix/ai_extractor/openrouter.py +20 -0
  9. txt2stix/ai_extractor/prompts.py +164 -0
  10. txt2stix/ai_extractor/utils.py +85 -0
  11. txt2stix/attack_flow.py +101 -0
  12. txt2stix/bundler.py +428 -0
  13. txt2stix/common.py +23 -0
  14. txt2stix/extractions.py +59 -0
  15. txt2stix/includes/__init__.py +0 -0
  16. txt2stix/includes/extractions/ai/config.yaml +1023 -0
  17. txt2stix/includes/extractions/lookup/config.yaml +393 -0
  18. txt2stix/includes/extractions/pattern/config.yaml +609 -0
  19. txt2stix/includes/helpers/mimetype_filename_extension_list.csv +936 -0
  20. txt2stix/includes/helpers/stix_relationship_types.txt +41 -0
  21. txt2stix/includes/helpers/tlds.txt +1446 -0
  22. txt2stix/includes/helpers/windows_registry_key_prefix.txt +12 -0
  23. txt2stix/includes/lookups/_README.md +11 -0
  24. txt2stix/includes/lookups/_generate_lookups.py +247 -0
  25. txt2stix/includes/lookups/attack_pattern.txt +1 -0
  26. txt2stix/includes/lookups/campaign.txt +1 -0
  27. txt2stix/includes/lookups/country_iso3166_alpha2.txt +249 -0
  28. txt2stix/includes/lookups/course_of_action.txt +1 -0
  29. txt2stix/includes/lookups/disarm_id_v1_5.txt +345 -0
  30. txt2stix/includes/lookups/disarm_name_v1_5.txt +347 -0
  31. txt2stix/includes/lookups/extensions.txt +78 -0
  32. txt2stix/includes/lookups/identity.txt +1 -0
  33. txt2stix/includes/lookups/infrastructure.txt +1 -0
  34. txt2stix/includes/lookups/intrusion_set.txt +1 -0
  35. txt2stix/includes/lookups/malware.txt +2 -0
  36. txt2stix/includes/lookups/mitre_atlas_id_v4_5_2.txt +116 -0
  37. txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +117 -0
  38. txt2stix/includes/lookups/mitre_attack_enterprise_aliases_v16_0.txt +1502 -0
  39. txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +1656 -0
  40. txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +1765 -0
  41. txt2stix/includes/lookups/mitre_attack_ics_aliases_v16_0.txt +141 -0
  42. txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +254 -0
  43. txt2stix/includes/lookups/mitre_attack_ics_name_v16_0.txt +293 -0
  44. txt2stix/includes/lookups/mitre_attack_mobile_aliases_v16_0.txt +159 -0
  45. txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +277 -0
  46. txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +296 -0
  47. txt2stix/includes/lookups/mitre_capec_id_v3_9.txt +559 -0
  48. txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +560 -0
  49. txt2stix/includes/lookups/mitre_cwe_id_v4_15.txt +939 -0
  50. txt2stix/includes/lookups/mitre_cwe_name_v4_15.txt +939 -0
  51. txt2stix/includes/lookups/threat_actor.txt +1 -0
  52. txt2stix/includes/lookups/tld.txt +1422 -0
  53. txt2stix/includes/lookups/tool.txt +1 -0
  54. txt2stix/includes/tests/test_cases.yaml +695 -0
  55. txt2stix/indicator.py +860 -0
  56. txt2stix/lookups.py +68 -0
  57. txt2stix/pattern/__init__.py +13 -0
  58. txt2stix/pattern/extractors/__init__.py +0 -0
  59. txt2stix/pattern/extractors/base_extractor.py +167 -0
  60. txt2stix/pattern/extractors/card/README.md +34 -0
  61. txt2stix/pattern/extractors/card/__init__.py +15 -0
  62. txt2stix/pattern/extractors/card/amex_card_extractor.py +52 -0
  63. txt2stix/pattern/extractors/card/diners_card_extractor.py +47 -0
  64. txt2stix/pattern/extractors/card/discover_card_extractor.py +48 -0
  65. txt2stix/pattern/extractors/card/jcb_card_extractor.py +43 -0
  66. txt2stix/pattern/extractors/card/master_card_extractor.py +63 -0
  67. txt2stix/pattern/extractors/card/union_card_extractor.py +38 -0
  68. txt2stix/pattern/extractors/card/visa_card_extractor.py +46 -0
  69. txt2stix/pattern/extractors/crypto/__init__.py +3 -0
  70. txt2stix/pattern/extractors/crypto/btc_extractor.py +38 -0
  71. txt2stix/pattern/extractors/directory/__init__.py +10 -0
  72. txt2stix/pattern/extractors/directory/unix_directory_extractor.py +40 -0
  73. txt2stix/pattern/extractors/directory/unix_file_path_extractor.py +42 -0
  74. txt2stix/pattern/extractors/directory/windows_directory_path_extractor.py +47 -0
  75. txt2stix/pattern/extractors/directory/windows_file_path_extractor.py +42 -0
  76. txt2stix/pattern/extractors/domain/__init__.py +8 -0
  77. txt2stix/pattern/extractors/domain/domain_extractor.py +39 -0
  78. txt2stix/pattern/extractors/domain/hostname_extractor.py +36 -0
  79. txt2stix/pattern/extractors/domain/sub_domain_extractor.py +49 -0
  80. txt2stix/pattern/extractors/hashes/__init__.py +16 -0
  81. txt2stix/pattern/extractors/hashes/md5_extractor.py +16 -0
  82. txt2stix/pattern/extractors/hashes/sha1_extractor.py +14 -0
  83. txt2stix/pattern/extractors/hashes/sha224_extractor.py +18 -0
  84. txt2stix/pattern/extractors/hashes/sha2_256_exactor.py +14 -0
  85. txt2stix/pattern/extractors/hashes/sha2_512_exactor.py +13 -0
  86. txt2stix/pattern/extractors/hashes/sha3_256_exactor.py +15 -0
  87. txt2stix/pattern/extractors/hashes/sha3_512_exactor.py +16 -0
  88. txt2stix/pattern/extractors/helper.py +64 -0
  89. txt2stix/pattern/extractors/ip/__init__.py +14 -0
  90. txt2stix/pattern/extractors/ip/ipv4_cidr_extractor.py +49 -0
  91. txt2stix/pattern/extractors/ip/ipv4_extractor.py +18 -0
  92. txt2stix/pattern/extractors/ip/ipv4_port_extractor.py +42 -0
  93. txt2stix/pattern/extractors/ip/ipv6_cidr_extractor.py +18 -0
  94. txt2stix/pattern/extractors/ip/ipv6_extractor.py +16 -0
  95. txt2stix/pattern/extractors/ip/ipv6_port_extractor.py +46 -0
  96. txt2stix/pattern/extractors/others/__init__.py +22 -0
  97. txt2stix/pattern/extractors/others/asn_extractor.py +14 -0
  98. txt2stix/pattern/extractors/others/cpe_extractor.py +29 -0
  99. txt2stix/pattern/extractors/others/cve_extractor.py +14 -0
  100. txt2stix/pattern/extractors/others/email_extractor.py +21 -0
  101. txt2stix/pattern/extractors/others/filename_extractor.py +17 -0
  102. txt2stix/pattern/extractors/others/iban_extractor.py +15 -0
  103. txt2stix/pattern/extractors/others/mac_address_extractor.py +13 -0
  104. txt2stix/pattern/extractors/others/phonenumber_extractor.py +41 -0
  105. txt2stix/pattern/extractors/others/user_agent_extractor.py +20 -0
  106. txt2stix/pattern/extractors/others/windows_registry_key_extractor.py +18 -0
  107. txt2stix/pattern/extractors/url/__init__.py +7 -0
  108. txt2stix/pattern/extractors/url/url_extractor.py +22 -0
  109. txt2stix/pattern/extractors/url/url_file_extractor.py +21 -0
  110. txt2stix/pattern/extractors/url/url_path_extractor.py +74 -0
  111. txt2stix/retriever.py +126 -0
  112. txt2stix/stix.py +1 -0
  113. txt2stix/txt2stix.py +336 -0
  114. txt2stix/utils.py +86 -0
  115. txt2stix-0.0.4.dist-info/METADATA +190 -0
  116. txt2stix-0.0.4.dist-info/RECORD +119 -0
  117. txt2stix-0.0.4.dist-info/WHEEL +4 -0
  118. txt2stix-0.0.4.dist-info/entry_points.txt +2 -0
  119. txt2stix-0.0.4.dist-info/licenses/LICENSE +202 -0
@@ -0,0 +1,141 @@
1
+ Triton Safety Instrumented System Attack
2
+ 2015 Ukraine Electric Power Attack
3
+ Maroochy Water Breach
4
+ Unitronics Defacement Campaign
5
+ 2016 Ukraine Electric Power Attack
6
+ 2022 Ukraine Electric Power Attack
7
+ APT38
8
+ NICKEL GLADSTONE
9
+ BeagleBoyz
10
+ Bluenoroff
11
+ Stardust Chollima
12
+ Sapphire Sleet
13
+ COPERNICIUM
14
+ ALLANITE
15
+ Palmetto Fusion
16
+ Dragonfly
17
+ TEMP.Isotope
18
+ DYMALLOY
19
+ Berserk Bear
20
+ TG-4192
21
+ Crouching Yeti
22
+ IRON LIBERTY
23
+ Energetic Bear
24
+ Ghost Blizzard
25
+ BROMINE
26
+ FIN6
27
+ Magecart Group 6
28
+ ITG08
29
+ Skeleton Spider
30
+ TAAL
31
+ Camouflage Tempest
32
+ FIN7
33
+ GOLD NIAGARA
34
+ ITG14
35
+ Carbon Spider
36
+ ELBRUS
37
+ Sangria Tempest
38
+ Sandworm Team
39
+ ELECTRUM
40
+ Telebots
41
+ IRON VIKING
42
+ BlackEnergy (Group)
43
+ Quedagh
44
+ Voodoo Bear
45
+ IRIDIUM
46
+ Seashell Blizzard
47
+ FROZENBARENTS
48
+ APT44
49
+ OilRig
50
+ COBALT GYPSY
51
+ IRN2
52
+ APT34
53
+ Helix Kitten
54
+ Evasive Serpens
55
+ Hazel Sandstorm
56
+ EUROPIUM
57
+ ITG13
58
+ TEMP.Veles
59
+ XENOTIME
60
+ CyberAv3ngers
61
+ Soldiers of Soloman
62
+ GOLD SOUTHFIELD
63
+ Pinchy Spider
64
+ Lazarus Group
65
+ Labyrinth Chollima
66
+ HIDDEN COBRA
67
+ Guardians of Peace
68
+ ZINC
69
+ NICKEL ACADEMY
70
+ Diamond Sleet
71
+ Wizard Spider
72
+ UNC1878
73
+ TEMP.MixMaster
74
+ Grim Spider
75
+ FIN12
76
+ GOLD BLACKBURN
77
+ ITG23
78
+ Periwinkle Tempest
79
+ DEV-0193
80
+ HEXANE
81
+ Lyceum
82
+ Siamesekitten
83
+ Spirlin
84
+ APT33
85
+ HOLMIUM
86
+ Elfin
87
+ Peach Sandstorm
88
+ EKANS
89
+ SNAKEHOSE
90
+ Backdoor.Oldrea
91
+ Havex
92
+ Stuxnet
93
+ W32.Stuxnet
94
+ Bad Rabbit
95
+ Win32/Diskcoder.D
96
+ PLC-Blaster
97
+ BlackEnergy
98
+ Black Energy
99
+ NotPetya
100
+ ExPetr
101
+ Diskcoder.C
102
+ GoldenEye
103
+ Petrwrap
104
+ Nyetya
105
+ Conficker
106
+ Kido
107
+ Downadup
108
+ LockerGoga
109
+ VPNFilter
110
+ Duqu
111
+ Industroyer2
112
+ WannaCry
113
+ WanaCry
114
+ WanaCrypt
115
+ WanaCrypt0r
116
+ WCry
117
+ Triton
118
+ TRISIS
119
+ HatMan
120
+ Fuxnet
121
+ Ryuk
122
+ ACAD/Medre.A
123
+ REvil
124
+ Sodin
125
+ Sodinokibi
126
+ INCONTROLLER
127
+ PIPEDREAM
128
+ KillDisk
129
+ Win32/KillDisk.NBI
130
+ Win32/KillDisk.NBH
131
+ Win32/KillDisk.NBD
132
+ Win32/KillDisk.NBC
133
+ Win32/KillDisk.NBB
134
+ Industroyer
135
+ CRASHOVERRIDE
136
+ Win32/Industroyer
137
+ Flame
138
+ Flamer
139
+ sKyWIper
140
+ Leafminer
141
+ Raspite
@@ -0,0 +1,254 @@
1
+ A0001
2
+ A0002
3
+ A0003
4
+ A0004
5
+ A0005
6
+ A0006
7
+ A0007
8
+ A0008
9
+ A0009
10
+ A0010
11
+ A0011
12
+ A0012
13
+ A0013
14
+ A0014
15
+ C0020
16
+ C0025
17
+ C0028
18
+ C0030
19
+ C0031
20
+ C0034
21
+ DS0001
22
+ DS0002
23
+ DS0003
24
+ DS0009
25
+ DS0011
26
+ DS0012
27
+ DS0015
28
+ DS0016
29
+ DS0017
30
+ DS0019
31
+ DS0022
32
+ DS0024
33
+ DS0028
34
+ DS0029
35
+ DS0033
36
+ DS0039
37
+ DS0040
38
+ G0032
39
+ G0034
40
+ G0035
41
+ G0037
42
+ G0046
43
+ G0049
44
+ G0064
45
+ G0077
46
+ G0082
47
+ G0088
48
+ G0102
49
+ G0115
50
+ G1000
51
+ G1001
52
+ G1027
53
+ M0800
54
+ M0801
55
+ M0802
56
+ M0803
57
+ M0804
58
+ M0805
59
+ M0806
60
+ M0807
61
+ M0808
62
+ M0809
63
+ M0810
64
+ M0811
65
+ M0812
66
+ M0813
67
+ M0814
68
+ M0815
69
+ M0816
70
+ M0817
71
+ M0818
72
+ M0913
73
+ M0915
74
+ M0916
75
+ M0917
76
+ M0918
77
+ M0919
78
+ M0920
79
+ M0921
80
+ M0922
81
+ M0924
82
+ M0926
83
+ M0927
84
+ M0928
85
+ M0930
86
+ M0931
87
+ M0932
88
+ M0934
89
+ M0935
90
+ M0936
91
+ M0937
92
+ M0938
93
+ M0941
94
+ M0942
95
+ M0944
96
+ M0945
97
+ M0946
98
+ M0947
99
+ M0948
100
+ M0949
101
+ M0950
102
+ M0951
103
+ M0953
104
+ M0954
105
+ M1013
106
+ M1015
107
+ M1016
108
+ M1017
109
+ M1018
110
+ M1019
111
+ M1020
112
+ M1021
113
+ M1022
114
+ M1024
115
+ M1026
116
+ M1027
117
+ M1028
118
+ M1030
119
+ M1031
120
+ M1032
121
+ M1034
122
+ M1035
123
+ M1036
124
+ M1037
125
+ M1038
126
+ M1041
127
+ M1042
128
+ M1044
129
+ M1045
130
+ M1046
131
+ M1047
132
+ M1048
133
+ M1049
134
+ M1050
135
+ M1051
136
+ M1053
137
+ M1054
138
+ S0038
139
+ S0089
140
+ S0093
141
+ S0143
142
+ S0366
143
+ S0368
144
+ S0372
145
+ S0446
146
+ S0496
147
+ S0603
148
+ S0604
149
+ S0605
150
+ S0606
151
+ S0607
152
+ S0608
153
+ S1000
154
+ S1006
155
+ S1009
156
+ S1010
157
+ S1045
158
+ S1072
159
+ S1157
160
+ T0800
161
+ T0801
162
+ T0802
163
+ T0803
164
+ T0804
165
+ T0805
166
+ T0806
167
+ T0807
168
+ T0809
169
+ T0811
170
+ T0812
171
+ T0813
172
+ T0814
173
+ T0815
174
+ T0816
175
+ T0817
176
+ T0819
177
+ T0820
178
+ T0821
179
+ T0822
180
+ T0823
181
+ T0826
182
+ T0827
183
+ T0828
184
+ T0829
185
+ T0830
186
+ T0831
187
+ T0832
188
+ T0834
189
+ T0835
190
+ T0836
191
+ T0837
192
+ T0838
193
+ T0839
194
+ T0840
195
+ T0842
196
+ T0843
197
+ T0845
198
+ T0846
199
+ T0847
200
+ T0848
201
+ T0849
202
+ T0851
203
+ T0852
204
+ T0853
205
+ T0855
206
+ T0856
207
+ T0857
208
+ T0858
209
+ T0859
210
+ T0860
211
+ T0861
212
+ T0862
213
+ T0863
214
+ T0864
215
+ T0865
216
+ T0866
217
+ T0867
218
+ T0868
219
+ T0869
220
+ T0871
221
+ T0872
222
+ T0873
223
+ T0874
224
+ T0877
225
+ T0878
226
+ T0879
227
+ T0880
228
+ T0881
229
+ T0882
230
+ T0883
231
+ T0884
232
+ T0885
233
+ T0886
234
+ T0887
235
+ T0888
236
+ T0889
237
+ T0890
238
+ T0891
239
+ T0892
240
+ T0893
241
+ T0894
242
+ T0895
243
+ TA0100
244
+ TA0101
245
+ TA0102
246
+ TA0103
247
+ TA0104
248
+ TA0105
249
+ TA0106
250
+ TA0107
251
+ TA0108
252
+ TA0109
253
+ TA0110
254
+ TA0111
@@ -0,0 +1,293 @@
1
+ ICS ATT&CK
2
+ Block Command Message
3
+ Service Stop
4
+ Modify Parameter
5
+ Modify Controller Tasking
6
+ Wireless Sniffing
7
+ Loss of View
8
+ Activate Firmware Update Mode
9
+ Manipulation of Control
10
+ Denial of Service
11
+ Block Serial COM
12
+ System Binary Proxy Execution
13
+ Command-Line Interface
14
+ Point & Tag Identification
15
+ Device Restart/Shutdown
16
+ User Execution
17
+ Wireless Compromise
18
+ Change Operating Mode
19
+ Alarm Suppression
20
+ Detect Operating Mode
21
+ Loss of Protection
22
+ Monitor Process State
23
+ Scripting
24
+ Remote System Information Discovery
25
+ Program Upload
26
+ Exploit Public-Facing Application
27
+ Data from Information Repositories
28
+ Transient Cyber Asset
29
+ Manipulate I/O Image
30
+ Network Sniffing
31
+ Rootkit
32
+ Automated Collection
33
+ Block Reporting Message
34
+ Unauthorized Command Message
35
+ Data Destruction
36
+ Manipulation of View
37
+ Indicator Removal on Host
38
+ I/O Image
39
+ Denial of View
40
+ Execution through API
41
+ Supply Chain Compromise
42
+ Loss of Safety
43
+ Loss of Productivity and Revenue
44
+ Spearphishing Attachment
45
+ Autorun Image
46
+ Drive-by Compromise
47
+ Damage to Property
48
+ Spoof Reporting Message
49
+ Exploitation of Remote Services
50
+ Default Credentials
51
+ External Remote Services
52
+ Brute Force I/O
53
+ Adversary-in-the-Middle
54
+ Exploitation for Evasion
55
+ Loss of Control
56
+ Hooking
57
+ Graphical User Interface
58
+ Rogue Master
59
+ Native API
60
+ Loss of Availability
61
+ Theft of Operational Information
62
+ System Firmware
63
+ Masquerading
64
+ Program Download
65
+ Replication Through Removable Media
66
+ Screen Capture
67
+ Hardcoded Credentials
68
+ Valid Accounts
69
+ Exploitation for Privilege Escalation
70
+ Remote System Discovery
71
+ Connection Proxy
72
+ Standard Application Layer Protocol
73
+ Remote Services
74
+ Denial of Control
75
+ Modify Alarm Settings
76
+ Commonly Used Port
77
+ Project File Infection
78
+ Network Connection Enumeration
79
+ Lateral Tool Transfer
80
+ Module Firmware
81
+ Internet Accessible Device
82
+ Data from Local System
83
+ Change Credential
84
+ Modify Program
85
+ Triton Safety Instrumented System Attack
86
+ 2015 Ukraine Electric Power Attack
87
+ Maroochy Water Breach
88
+ Unitronics Defacement Campaign
89
+ 2016 Ukraine Electric Power Attack
90
+ 2022 Ukraine Electric Power Attack
91
+ Application Isolation and Sandboxing
92
+ Filter Network Traffic
93
+ Restrict Web-Based Content
94
+ Validate Program Inputs
95
+ Network Segmentation
96
+ Restrict Library Loading
97
+ Active Directory Configuration
98
+ Network Intrusion Prevention
99
+ Restrict Registry Permissions
100
+ Data Loss Prevention
101
+ Access Management
102
+ Mitigation Limited or Not Effective
103
+ Exploit Protection
104
+ Limit Access to Resource Over Network
105
+ Execution Prevention
106
+ Static Network Configuration
107
+ Password Policies
108
+ Privileged Account Management
109
+ Human User Authentication
110
+ SSL/TLS Inspection
111
+ Code Signing
112
+ Software Process and Device Authentication
113
+ Encrypt Network Traffic
114
+ Account Use Policies
115
+ Application Developer Guidance
116
+ Boot Integrity
117
+ Mechanical Protection Layers
118
+ Update Software
119
+ Watchdog Timers
120
+ Operational Information Confidentiality
121
+ Operating System Configuration
122
+ Limit Hardware Installation
123
+ Encrypt Sensitive Information
124
+ Network Allowlists
125
+ Supply Chain Management
126
+ Data Backup
127
+ Out-of-Band Communications Channel
128
+ Audit
129
+ Communication Authenticity
130
+ Disable or Remove Feature or Program
131
+ Threat Intelligence Program
132
+ Safety Instrumented Systems
133
+ User Training
134
+ Multi-factor Authentication
135
+ Vulnerability Scanning
136
+ Authorization Enforcement
137
+ User Account Management
138
+ Redundancy of Service
139
+ Restrict File and Directory Permissions
140
+ Software Configuration
141
+ Antivirus/Antimalware
142
+ Minimize Wireless Signal Propagation
143
+ The MITRE Corporation
144
+ APT38
145
+ ALLANITE
146
+ Dragonfly
147
+ FIN6
148
+ FIN7
149
+ Sandworm Team
150
+ OilRig
151
+ TEMP.Veles
152
+ CyberAv3ngers
153
+ GOLD SOUTHFIELD
154
+ Lazarus Group
155
+ Wizard Spider
156
+ HEXANE
157
+ APT33
158
+ EKANS
159
+ Backdoor.Oldrea
160
+ Stuxnet
161
+ Bad Rabbit
162
+ PLC-Blaster
163
+ BlackEnergy
164
+ NotPetya
165
+ Conficker
166
+ LockerGoga
167
+ VPNFilter
168
+ Duqu
169
+ Industroyer2
170
+ WannaCry
171
+ Triton
172
+ Fuxnet
173
+ Ryuk
174
+ ACAD/Medre.A
175
+ REvil
176
+ INCONTROLLER
177
+ KillDisk
178
+ Industroyer
179
+ Flame
180
+ None
181
+ Virtual Private Network (VPN) Server
182
+ Jump Host
183
+ Remote Terminal Unit (RTU)
184
+ Field I/O
185
+ Human-Machine Interface (HMI)
186
+ Data Gateway
187
+ Safety Controller
188
+ Intelligent Electronic Device (IED)
189
+ Application Server
190
+ Programmable Logic Controller (PLC)
191
+ Routers
192
+ Data Historian
193
+ Control Server
194
+ Workstation
195
+ Windows Registry Key Deletion
196
+ Network Connection Creation
197
+ File Access
198
+ File Creation
199
+ Network Traffic Content
200
+ Logon Session Metadata
201
+ Process Creation
202
+ Drive Creation
203
+ Process/Event Alarm
204
+ Drive Modification
205
+ Service Creation
206
+ Process Termination
207
+ File Metadata
208
+ Service Modification
209
+ Command Execution
210
+ Service Metadata
211
+ Scheduled Job Metadata
212
+ File Modification
213
+ Software
214
+ Process History/Live Data
215
+ OS API Execution
216
+ Application Log Content
217
+ Logon Session Creation
218
+ Device Alarm
219
+ Script Execution
220
+ Network Traffic Flow
221
+ User Account Authentication
222
+ Asset Inventory
223
+ Firmware Modification
224
+ Module Load
225
+ Windows Registry Key Modification
226
+ File Deletion
227
+ Process Metadata
228
+ Scheduled Job Creation
229
+ Network Share Access
230
+ Scheduled Job Modification
231
+ User Account
232
+ Windows Registry
233
+ Script
234
+ Operational Databases
235
+ Application Log
236
+ Logon Session
237
+ File
238
+ Drive
239
+ Command
240
+ Asset
241
+ Network Share
242
+ Network Traffic
243
+ Scheduled Job
244
+ Firmware
245
+ Service
246
+ Process
247
+ Module
248
+ Inhibit Response Function
249
+ Privilege Escalation
250
+ Lateral Movement
251
+ Discovery
252
+ Initial Access
253
+ Impact
254
+ Persistence
255
+ Execution
256
+ Command and Control
257
+ Collection
258
+ Evasion
259
+ Impair Process Control
260
+ Network Intrusion Prevention
261
+ Vulnerability Scanning
262
+ Limit Access to Resource Over Network
263
+ Filter Network Traffic
264
+ Restrict Web-Based Content
265
+ Application Developer Guidance
266
+ Limit Hardware Installation
267
+ User Training
268
+ Operating System Configuration
269
+ Data Backup
270
+ Execution Prevention
271
+ Code Signing
272
+ SSL/TLS Inspection
273
+ Boot Integrity
274
+ Network Segmentation
275
+ Threat Intelligence Program
276
+ Password Policies
277
+ User Account Management
278
+ Restrict File and Directory Permissions
279
+ Privileged Account Management
280
+ Restrict Registry Permissions
281
+ Antivirus/Antimalware
282
+ Multi-factor Authentication
283
+ Software Configuration
284
+ Application Isolation and Sandboxing
285
+ Audit
286
+ Exploit Protection
287
+ Active Directory Configuration
288
+ Update Software
289
+ Restrict Library Loading
290
+ Disable or Remove Feature or Program
291
+ Account Use Policies
292
+ Encrypt Sensitive Information
293
+ Leafminer