txt2stix 0.0.4__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- txt2stix/__init__.py +33 -0
- txt2stix/ai_extractor/__init__.py +15 -0
- txt2stix/ai_extractor/anthropic.py +12 -0
- txt2stix/ai_extractor/base.py +87 -0
- txt2stix/ai_extractor/deepseek.py +19 -0
- txt2stix/ai_extractor/gemini.py +18 -0
- txt2stix/ai_extractor/openai.py +15 -0
- txt2stix/ai_extractor/openrouter.py +20 -0
- txt2stix/ai_extractor/prompts.py +164 -0
- txt2stix/ai_extractor/utils.py +85 -0
- txt2stix/attack_flow.py +101 -0
- txt2stix/bundler.py +428 -0
- txt2stix/common.py +23 -0
- txt2stix/extractions.py +59 -0
- txt2stix/includes/__init__.py +0 -0
- txt2stix/includes/extractions/ai/config.yaml +1023 -0
- txt2stix/includes/extractions/lookup/config.yaml +393 -0
- txt2stix/includes/extractions/pattern/config.yaml +609 -0
- txt2stix/includes/helpers/mimetype_filename_extension_list.csv +936 -0
- txt2stix/includes/helpers/stix_relationship_types.txt +41 -0
- txt2stix/includes/helpers/tlds.txt +1446 -0
- txt2stix/includes/helpers/windows_registry_key_prefix.txt +12 -0
- txt2stix/includes/lookups/_README.md +11 -0
- txt2stix/includes/lookups/_generate_lookups.py +247 -0
- txt2stix/includes/lookups/attack_pattern.txt +1 -0
- txt2stix/includes/lookups/campaign.txt +1 -0
- txt2stix/includes/lookups/country_iso3166_alpha2.txt +249 -0
- txt2stix/includes/lookups/course_of_action.txt +1 -0
- txt2stix/includes/lookups/disarm_id_v1_5.txt +345 -0
- txt2stix/includes/lookups/disarm_name_v1_5.txt +347 -0
- txt2stix/includes/lookups/extensions.txt +78 -0
- txt2stix/includes/lookups/identity.txt +1 -0
- txt2stix/includes/lookups/infrastructure.txt +1 -0
- txt2stix/includes/lookups/intrusion_set.txt +1 -0
- txt2stix/includes/lookups/malware.txt +2 -0
- txt2stix/includes/lookups/mitre_atlas_id_v4_5_2.txt +116 -0
- txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +117 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_aliases_v16_0.txt +1502 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +1656 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +1765 -0
- txt2stix/includes/lookups/mitre_attack_ics_aliases_v16_0.txt +141 -0
- txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +254 -0
- txt2stix/includes/lookups/mitre_attack_ics_name_v16_0.txt +293 -0
- txt2stix/includes/lookups/mitre_attack_mobile_aliases_v16_0.txt +159 -0
- txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +277 -0
- txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +296 -0
- txt2stix/includes/lookups/mitre_capec_id_v3_9.txt +559 -0
- txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +560 -0
- txt2stix/includes/lookups/mitre_cwe_id_v4_15.txt +939 -0
- txt2stix/includes/lookups/mitre_cwe_name_v4_15.txt +939 -0
- txt2stix/includes/lookups/threat_actor.txt +1 -0
- txt2stix/includes/lookups/tld.txt +1422 -0
- txt2stix/includes/lookups/tool.txt +1 -0
- txt2stix/includes/tests/test_cases.yaml +695 -0
- txt2stix/indicator.py +860 -0
- txt2stix/lookups.py +68 -0
- txt2stix/pattern/__init__.py +13 -0
- txt2stix/pattern/extractors/__init__.py +0 -0
- txt2stix/pattern/extractors/base_extractor.py +167 -0
- txt2stix/pattern/extractors/card/README.md +34 -0
- txt2stix/pattern/extractors/card/__init__.py +15 -0
- txt2stix/pattern/extractors/card/amex_card_extractor.py +52 -0
- txt2stix/pattern/extractors/card/diners_card_extractor.py +47 -0
- txt2stix/pattern/extractors/card/discover_card_extractor.py +48 -0
- txt2stix/pattern/extractors/card/jcb_card_extractor.py +43 -0
- txt2stix/pattern/extractors/card/master_card_extractor.py +63 -0
- txt2stix/pattern/extractors/card/union_card_extractor.py +38 -0
- txt2stix/pattern/extractors/card/visa_card_extractor.py +46 -0
- txt2stix/pattern/extractors/crypto/__init__.py +3 -0
- txt2stix/pattern/extractors/crypto/btc_extractor.py +38 -0
- txt2stix/pattern/extractors/directory/__init__.py +10 -0
- txt2stix/pattern/extractors/directory/unix_directory_extractor.py +40 -0
- txt2stix/pattern/extractors/directory/unix_file_path_extractor.py +42 -0
- txt2stix/pattern/extractors/directory/windows_directory_path_extractor.py +47 -0
- txt2stix/pattern/extractors/directory/windows_file_path_extractor.py +42 -0
- txt2stix/pattern/extractors/domain/__init__.py +8 -0
- txt2stix/pattern/extractors/domain/domain_extractor.py +39 -0
- txt2stix/pattern/extractors/domain/hostname_extractor.py +36 -0
- txt2stix/pattern/extractors/domain/sub_domain_extractor.py +49 -0
- txt2stix/pattern/extractors/hashes/__init__.py +16 -0
- txt2stix/pattern/extractors/hashes/md5_extractor.py +16 -0
- txt2stix/pattern/extractors/hashes/sha1_extractor.py +14 -0
- txt2stix/pattern/extractors/hashes/sha224_extractor.py +18 -0
- txt2stix/pattern/extractors/hashes/sha2_256_exactor.py +14 -0
- txt2stix/pattern/extractors/hashes/sha2_512_exactor.py +13 -0
- txt2stix/pattern/extractors/hashes/sha3_256_exactor.py +15 -0
- txt2stix/pattern/extractors/hashes/sha3_512_exactor.py +16 -0
- txt2stix/pattern/extractors/helper.py +64 -0
- txt2stix/pattern/extractors/ip/__init__.py +14 -0
- txt2stix/pattern/extractors/ip/ipv4_cidr_extractor.py +49 -0
- txt2stix/pattern/extractors/ip/ipv4_extractor.py +18 -0
- txt2stix/pattern/extractors/ip/ipv4_port_extractor.py +42 -0
- txt2stix/pattern/extractors/ip/ipv6_cidr_extractor.py +18 -0
- txt2stix/pattern/extractors/ip/ipv6_extractor.py +16 -0
- txt2stix/pattern/extractors/ip/ipv6_port_extractor.py +46 -0
- txt2stix/pattern/extractors/others/__init__.py +22 -0
- txt2stix/pattern/extractors/others/asn_extractor.py +14 -0
- txt2stix/pattern/extractors/others/cpe_extractor.py +29 -0
- txt2stix/pattern/extractors/others/cve_extractor.py +14 -0
- txt2stix/pattern/extractors/others/email_extractor.py +21 -0
- txt2stix/pattern/extractors/others/filename_extractor.py +17 -0
- txt2stix/pattern/extractors/others/iban_extractor.py +15 -0
- txt2stix/pattern/extractors/others/mac_address_extractor.py +13 -0
- txt2stix/pattern/extractors/others/phonenumber_extractor.py +41 -0
- txt2stix/pattern/extractors/others/user_agent_extractor.py +20 -0
- txt2stix/pattern/extractors/others/windows_registry_key_extractor.py +18 -0
- txt2stix/pattern/extractors/url/__init__.py +7 -0
- txt2stix/pattern/extractors/url/url_extractor.py +22 -0
- txt2stix/pattern/extractors/url/url_file_extractor.py +21 -0
- txt2stix/pattern/extractors/url/url_path_extractor.py +74 -0
- txt2stix/retriever.py +126 -0
- txt2stix/stix.py +1 -0
- txt2stix/txt2stix.py +336 -0
- txt2stix/utils.py +86 -0
- txt2stix-0.0.4.dist-info/METADATA +190 -0
- txt2stix-0.0.4.dist-info/RECORD +119 -0
- txt2stix-0.0.4.dist-info/WHEEL +4 -0
- txt2stix-0.0.4.dist-info/entry_points.txt +2 -0
- txt2stix-0.0.4.dist-info/licenses/LICENSE +202 -0
@@ -0,0 +1,141 @@
|
|
1
|
+
Triton Safety Instrumented System Attack
|
2
|
+
2015 Ukraine Electric Power Attack
|
3
|
+
Maroochy Water Breach
|
4
|
+
Unitronics Defacement Campaign
|
5
|
+
2016 Ukraine Electric Power Attack
|
6
|
+
2022 Ukraine Electric Power Attack
|
7
|
+
APT38
|
8
|
+
NICKEL GLADSTONE
|
9
|
+
BeagleBoyz
|
10
|
+
Bluenoroff
|
11
|
+
Stardust Chollima
|
12
|
+
Sapphire Sleet
|
13
|
+
COPERNICIUM
|
14
|
+
ALLANITE
|
15
|
+
Palmetto Fusion
|
16
|
+
Dragonfly
|
17
|
+
TEMP.Isotope
|
18
|
+
DYMALLOY
|
19
|
+
Berserk Bear
|
20
|
+
TG-4192
|
21
|
+
Crouching Yeti
|
22
|
+
IRON LIBERTY
|
23
|
+
Energetic Bear
|
24
|
+
Ghost Blizzard
|
25
|
+
BROMINE
|
26
|
+
FIN6
|
27
|
+
Magecart Group 6
|
28
|
+
ITG08
|
29
|
+
Skeleton Spider
|
30
|
+
TAAL
|
31
|
+
Camouflage Tempest
|
32
|
+
FIN7
|
33
|
+
GOLD NIAGARA
|
34
|
+
ITG14
|
35
|
+
Carbon Spider
|
36
|
+
ELBRUS
|
37
|
+
Sangria Tempest
|
38
|
+
Sandworm Team
|
39
|
+
ELECTRUM
|
40
|
+
Telebots
|
41
|
+
IRON VIKING
|
42
|
+
BlackEnergy (Group)
|
43
|
+
Quedagh
|
44
|
+
Voodoo Bear
|
45
|
+
IRIDIUM
|
46
|
+
Seashell Blizzard
|
47
|
+
FROZENBARENTS
|
48
|
+
APT44
|
49
|
+
OilRig
|
50
|
+
COBALT GYPSY
|
51
|
+
IRN2
|
52
|
+
APT34
|
53
|
+
Helix Kitten
|
54
|
+
Evasive Serpens
|
55
|
+
Hazel Sandstorm
|
56
|
+
EUROPIUM
|
57
|
+
ITG13
|
58
|
+
TEMP.Veles
|
59
|
+
XENOTIME
|
60
|
+
CyberAv3ngers
|
61
|
+
Soldiers of Soloman
|
62
|
+
GOLD SOUTHFIELD
|
63
|
+
Pinchy Spider
|
64
|
+
Lazarus Group
|
65
|
+
Labyrinth Chollima
|
66
|
+
HIDDEN COBRA
|
67
|
+
Guardians of Peace
|
68
|
+
ZINC
|
69
|
+
NICKEL ACADEMY
|
70
|
+
Diamond Sleet
|
71
|
+
Wizard Spider
|
72
|
+
UNC1878
|
73
|
+
TEMP.MixMaster
|
74
|
+
Grim Spider
|
75
|
+
FIN12
|
76
|
+
GOLD BLACKBURN
|
77
|
+
ITG23
|
78
|
+
Periwinkle Tempest
|
79
|
+
DEV-0193
|
80
|
+
HEXANE
|
81
|
+
Lyceum
|
82
|
+
Siamesekitten
|
83
|
+
Spirlin
|
84
|
+
APT33
|
85
|
+
HOLMIUM
|
86
|
+
Elfin
|
87
|
+
Peach Sandstorm
|
88
|
+
EKANS
|
89
|
+
SNAKEHOSE
|
90
|
+
Backdoor.Oldrea
|
91
|
+
Havex
|
92
|
+
Stuxnet
|
93
|
+
W32.Stuxnet
|
94
|
+
Bad Rabbit
|
95
|
+
Win32/Diskcoder.D
|
96
|
+
PLC-Blaster
|
97
|
+
BlackEnergy
|
98
|
+
Black Energy
|
99
|
+
NotPetya
|
100
|
+
ExPetr
|
101
|
+
Diskcoder.C
|
102
|
+
GoldenEye
|
103
|
+
Petrwrap
|
104
|
+
Nyetya
|
105
|
+
Conficker
|
106
|
+
Kido
|
107
|
+
Downadup
|
108
|
+
LockerGoga
|
109
|
+
VPNFilter
|
110
|
+
Duqu
|
111
|
+
Industroyer2
|
112
|
+
WannaCry
|
113
|
+
WanaCry
|
114
|
+
WanaCrypt
|
115
|
+
WanaCrypt0r
|
116
|
+
WCry
|
117
|
+
Triton
|
118
|
+
TRISIS
|
119
|
+
HatMan
|
120
|
+
Fuxnet
|
121
|
+
Ryuk
|
122
|
+
ACAD/Medre.A
|
123
|
+
REvil
|
124
|
+
Sodin
|
125
|
+
Sodinokibi
|
126
|
+
INCONTROLLER
|
127
|
+
PIPEDREAM
|
128
|
+
KillDisk
|
129
|
+
Win32/KillDisk.NBI
|
130
|
+
Win32/KillDisk.NBH
|
131
|
+
Win32/KillDisk.NBD
|
132
|
+
Win32/KillDisk.NBC
|
133
|
+
Win32/KillDisk.NBB
|
134
|
+
Industroyer
|
135
|
+
CRASHOVERRIDE
|
136
|
+
Win32/Industroyer
|
137
|
+
Flame
|
138
|
+
Flamer
|
139
|
+
sKyWIper
|
140
|
+
Leafminer
|
141
|
+
Raspite
|
@@ -0,0 +1,254 @@
|
|
1
|
+
A0001
|
2
|
+
A0002
|
3
|
+
A0003
|
4
|
+
A0004
|
5
|
+
A0005
|
6
|
+
A0006
|
7
|
+
A0007
|
8
|
+
A0008
|
9
|
+
A0009
|
10
|
+
A0010
|
11
|
+
A0011
|
12
|
+
A0012
|
13
|
+
A0013
|
14
|
+
A0014
|
15
|
+
C0020
|
16
|
+
C0025
|
17
|
+
C0028
|
18
|
+
C0030
|
19
|
+
C0031
|
20
|
+
C0034
|
21
|
+
DS0001
|
22
|
+
DS0002
|
23
|
+
DS0003
|
24
|
+
DS0009
|
25
|
+
DS0011
|
26
|
+
DS0012
|
27
|
+
DS0015
|
28
|
+
DS0016
|
29
|
+
DS0017
|
30
|
+
DS0019
|
31
|
+
DS0022
|
32
|
+
DS0024
|
33
|
+
DS0028
|
34
|
+
DS0029
|
35
|
+
DS0033
|
36
|
+
DS0039
|
37
|
+
DS0040
|
38
|
+
G0032
|
39
|
+
G0034
|
40
|
+
G0035
|
41
|
+
G0037
|
42
|
+
G0046
|
43
|
+
G0049
|
44
|
+
G0064
|
45
|
+
G0077
|
46
|
+
G0082
|
47
|
+
G0088
|
48
|
+
G0102
|
49
|
+
G0115
|
50
|
+
G1000
|
51
|
+
G1001
|
52
|
+
G1027
|
53
|
+
M0800
|
54
|
+
M0801
|
55
|
+
M0802
|
56
|
+
M0803
|
57
|
+
M0804
|
58
|
+
M0805
|
59
|
+
M0806
|
60
|
+
M0807
|
61
|
+
M0808
|
62
|
+
M0809
|
63
|
+
M0810
|
64
|
+
M0811
|
65
|
+
M0812
|
66
|
+
M0813
|
67
|
+
M0814
|
68
|
+
M0815
|
69
|
+
M0816
|
70
|
+
M0817
|
71
|
+
M0818
|
72
|
+
M0913
|
73
|
+
M0915
|
74
|
+
M0916
|
75
|
+
M0917
|
76
|
+
M0918
|
77
|
+
M0919
|
78
|
+
M0920
|
79
|
+
M0921
|
80
|
+
M0922
|
81
|
+
M0924
|
82
|
+
M0926
|
83
|
+
M0927
|
84
|
+
M0928
|
85
|
+
M0930
|
86
|
+
M0931
|
87
|
+
M0932
|
88
|
+
M0934
|
89
|
+
M0935
|
90
|
+
M0936
|
91
|
+
M0937
|
92
|
+
M0938
|
93
|
+
M0941
|
94
|
+
M0942
|
95
|
+
M0944
|
96
|
+
M0945
|
97
|
+
M0946
|
98
|
+
M0947
|
99
|
+
M0948
|
100
|
+
M0949
|
101
|
+
M0950
|
102
|
+
M0951
|
103
|
+
M0953
|
104
|
+
M0954
|
105
|
+
M1013
|
106
|
+
M1015
|
107
|
+
M1016
|
108
|
+
M1017
|
109
|
+
M1018
|
110
|
+
M1019
|
111
|
+
M1020
|
112
|
+
M1021
|
113
|
+
M1022
|
114
|
+
M1024
|
115
|
+
M1026
|
116
|
+
M1027
|
117
|
+
M1028
|
118
|
+
M1030
|
119
|
+
M1031
|
120
|
+
M1032
|
121
|
+
M1034
|
122
|
+
M1035
|
123
|
+
M1036
|
124
|
+
M1037
|
125
|
+
M1038
|
126
|
+
M1041
|
127
|
+
M1042
|
128
|
+
M1044
|
129
|
+
M1045
|
130
|
+
M1046
|
131
|
+
M1047
|
132
|
+
M1048
|
133
|
+
M1049
|
134
|
+
M1050
|
135
|
+
M1051
|
136
|
+
M1053
|
137
|
+
M1054
|
138
|
+
S0038
|
139
|
+
S0089
|
140
|
+
S0093
|
141
|
+
S0143
|
142
|
+
S0366
|
143
|
+
S0368
|
144
|
+
S0372
|
145
|
+
S0446
|
146
|
+
S0496
|
147
|
+
S0603
|
148
|
+
S0604
|
149
|
+
S0605
|
150
|
+
S0606
|
151
|
+
S0607
|
152
|
+
S0608
|
153
|
+
S1000
|
154
|
+
S1006
|
155
|
+
S1009
|
156
|
+
S1010
|
157
|
+
S1045
|
158
|
+
S1072
|
159
|
+
S1157
|
160
|
+
T0800
|
161
|
+
T0801
|
162
|
+
T0802
|
163
|
+
T0803
|
164
|
+
T0804
|
165
|
+
T0805
|
166
|
+
T0806
|
167
|
+
T0807
|
168
|
+
T0809
|
169
|
+
T0811
|
170
|
+
T0812
|
171
|
+
T0813
|
172
|
+
T0814
|
173
|
+
T0815
|
174
|
+
T0816
|
175
|
+
T0817
|
176
|
+
T0819
|
177
|
+
T0820
|
178
|
+
T0821
|
179
|
+
T0822
|
180
|
+
T0823
|
181
|
+
T0826
|
182
|
+
T0827
|
183
|
+
T0828
|
184
|
+
T0829
|
185
|
+
T0830
|
186
|
+
T0831
|
187
|
+
T0832
|
188
|
+
T0834
|
189
|
+
T0835
|
190
|
+
T0836
|
191
|
+
T0837
|
192
|
+
T0838
|
193
|
+
T0839
|
194
|
+
T0840
|
195
|
+
T0842
|
196
|
+
T0843
|
197
|
+
T0845
|
198
|
+
T0846
|
199
|
+
T0847
|
200
|
+
T0848
|
201
|
+
T0849
|
202
|
+
T0851
|
203
|
+
T0852
|
204
|
+
T0853
|
205
|
+
T0855
|
206
|
+
T0856
|
207
|
+
T0857
|
208
|
+
T0858
|
209
|
+
T0859
|
210
|
+
T0860
|
211
|
+
T0861
|
212
|
+
T0862
|
213
|
+
T0863
|
214
|
+
T0864
|
215
|
+
T0865
|
216
|
+
T0866
|
217
|
+
T0867
|
218
|
+
T0868
|
219
|
+
T0869
|
220
|
+
T0871
|
221
|
+
T0872
|
222
|
+
T0873
|
223
|
+
T0874
|
224
|
+
T0877
|
225
|
+
T0878
|
226
|
+
T0879
|
227
|
+
T0880
|
228
|
+
T0881
|
229
|
+
T0882
|
230
|
+
T0883
|
231
|
+
T0884
|
232
|
+
T0885
|
233
|
+
T0886
|
234
|
+
T0887
|
235
|
+
T0888
|
236
|
+
T0889
|
237
|
+
T0890
|
238
|
+
T0891
|
239
|
+
T0892
|
240
|
+
T0893
|
241
|
+
T0894
|
242
|
+
T0895
|
243
|
+
TA0100
|
244
|
+
TA0101
|
245
|
+
TA0102
|
246
|
+
TA0103
|
247
|
+
TA0104
|
248
|
+
TA0105
|
249
|
+
TA0106
|
250
|
+
TA0107
|
251
|
+
TA0108
|
252
|
+
TA0109
|
253
|
+
TA0110
|
254
|
+
TA0111
|
@@ -0,0 +1,293 @@
|
|
1
|
+
ICS ATT&CK
|
2
|
+
Block Command Message
|
3
|
+
Service Stop
|
4
|
+
Modify Parameter
|
5
|
+
Modify Controller Tasking
|
6
|
+
Wireless Sniffing
|
7
|
+
Loss of View
|
8
|
+
Activate Firmware Update Mode
|
9
|
+
Manipulation of Control
|
10
|
+
Denial of Service
|
11
|
+
Block Serial COM
|
12
|
+
System Binary Proxy Execution
|
13
|
+
Command-Line Interface
|
14
|
+
Point & Tag Identification
|
15
|
+
Device Restart/Shutdown
|
16
|
+
User Execution
|
17
|
+
Wireless Compromise
|
18
|
+
Change Operating Mode
|
19
|
+
Alarm Suppression
|
20
|
+
Detect Operating Mode
|
21
|
+
Loss of Protection
|
22
|
+
Monitor Process State
|
23
|
+
Scripting
|
24
|
+
Remote System Information Discovery
|
25
|
+
Program Upload
|
26
|
+
Exploit Public-Facing Application
|
27
|
+
Data from Information Repositories
|
28
|
+
Transient Cyber Asset
|
29
|
+
Manipulate I/O Image
|
30
|
+
Network Sniffing
|
31
|
+
Rootkit
|
32
|
+
Automated Collection
|
33
|
+
Block Reporting Message
|
34
|
+
Unauthorized Command Message
|
35
|
+
Data Destruction
|
36
|
+
Manipulation of View
|
37
|
+
Indicator Removal on Host
|
38
|
+
I/O Image
|
39
|
+
Denial of View
|
40
|
+
Execution through API
|
41
|
+
Supply Chain Compromise
|
42
|
+
Loss of Safety
|
43
|
+
Loss of Productivity and Revenue
|
44
|
+
Spearphishing Attachment
|
45
|
+
Autorun Image
|
46
|
+
Drive-by Compromise
|
47
|
+
Damage to Property
|
48
|
+
Spoof Reporting Message
|
49
|
+
Exploitation of Remote Services
|
50
|
+
Default Credentials
|
51
|
+
External Remote Services
|
52
|
+
Brute Force I/O
|
53
|
+
Adversary-in-the-Middle
|
54
|
+
Exploitation for Evasion
|
55
|
+
Loss of Control
|
56
|
+
Hooking
|
57
|
+
Graphical User Interface
|
58
|
+
Rogue Master
|
59
|
+
Native API
|
60
|
+
Loss of Availability
|
61
|
+
Theft of Operational Information
|
62
|
+
System Firmware
|
63
|
+
Masquerading
|
64
|
+
Program Download
|
65
|
+
Replication Through Removable Media
|
66
|
+
Screen Capture
|
67
|
+
Hardcoded Credentials
|
68
|
+
Valid Accounts
|
69
|
+
Exploitation for Privilege Escalation
|
70
|
+
Remote System Discovery
|
71
|
+
Connection Proxy
|
72
|
+
Standard Application Layer Protocol
|
73
|
+
Remote Services
|
74
|
+
Denial of Control
|
75
|
+
Modify Alarm Settings
|
76
|
+
Commonly Used Port
|
77
|
+
Project File Infection
|
78
|
+
Network Connection Enumeration
|
79
|
+
Lateral Tool Transfer
|
80
|
+
Module Firmware
|
81
|
+
Internet Accessible Device
|
82
|
+
Data from Local System
|
83
|
+
Change Credential
|
84
|
+
Modify Program
|
85
|
+
Triton Safety Instrumented System Attack
|
86
|
+
2015 Ukraine Electric Power Attack
|
87
|
+
Maroochy Water Breach
|
88
|
+
Unitronics Defacement Campaign
|
89
|
+
2016 Ukraine Electric Power Attack
|
90
|
+
2022 Ukraine Electric Power Attack
|
91
|
+
Application Isolation and Sandboxing
|
92
|
+
Filter Network Traffic
|
93
|
+
Restrict Web-Based Content
|
94
|
+
Validate Program Inputs
|
95
|
+
Network Segmentation
|
96
|
+
Restrict Library Loading
|
97
|
+
Active Directory Configuration
|
98
|
+
Network Intrusion Prevention
|
99
|
+
Restrict Registry Permissions
|
100
|
+
Data Loss Prevention
|
101
|
+
Access Management
|
102
|
+
Mitigation Limited or Not Effective
|
103
|
+
Exploit Protection
|
104
|
+
Limit Access to Resource Over Network
|
105
|
+
Execution Prevention
|
106
|
+
Static Network Configuration
|
107
|
+
Password Policies
|
108
|
+
Privileged Account Management
|
109
|
+
Human User Authentication
|
110
|
+
SSL/TLS Inspection
|
111
|
+
Code Signing
|
112
|
+
Software Process and Device Authentication
|
113
|
+
Encrypt Network Traffic
|
114
|
+
Account Use Policies
|
115
|
+
Application Developer Guidance
|
116
|
+
Boot Integrity
|
117
|
+
Mechanical Protection Layers
|
118
|
+
Update Software
|
119
|
+
Watchdog Timers
|
120
|
+
Operational Information Confidentiality
|
121
|
+
Operating System Configuration
|
122
|
+
Limit Hardware Installation
|
123
|
+
Encrypt Sensitive Information
|
124
|
+
Network Allowlists
|
125
|
+
Supply Chain Management
|
126
|
+
Data Backup
|
127
|
+
Out-of-Band Communications Channel
|
128
|
+
Audit
|
129
|
+
Communication Authenticity
|
130
|
+
Disable or Remove Feature or Program
|
131
|
+
Threat Intelligence Program
|
132
|
+
Safety Instrumented Systems
|
133
|
+
User Training
|
134
|
+
Multi-factor Authentication
|
135
|
+
Vulnerability Scanning
|
136
|
+
Authorization Enforcement
|
137
|
+
User Account Management
|
138
|
+
Redundancy of Service
|
139
|
+
Restrict File and Directory Permissions
|
140
|
+
Software Configuration
|
141
|
+
Antivirus/Antimalware
|
142
|
+
Minimize Wireless Signal Propagation
|
143
|
+
The MITRE Corporation
|
144
|
+
APT38
|
145
|
+
ALLANITE
|
146
|
+
Dragonfly
|
147
|
+
FIN6
|
148
|
+
FIN7
|
149
|
+
Sandworm Team
|
150
|
+
OilRig
|
151
|
+
TEMP.Veles
|
152
|
+
CyberAv3ngers
|
153
|
+
GOLD SOUTHFIELD
|
154
|
+
Lazarus Group
|
155
|
+
Wizard Spider
|
156
|
+
HEXANE
|
157
|
+
APT33
|
158
|
+
EKANS
|
159
|
+
Backdoor.Oldrea
|
160
|
+
Stuxnet
|
161
|
+
Bad Rabbit
|
162
|
+
PLC-Blaster
|
163
|
+
BlackEnergy
|
164
|
+
NotPetya
|
165
|
+
Conficker
|
166
|
+
LockerGoga
|
167
|
+
VPNFilter
|
168
|
+
Duqu
|
169
|
+
Industroyer2
|
170
|
+
WannaCry
|
171
|
+
Triton
|
172
|
+
Fuxnet
|
173
|
+
Ryuk
|
174
|
+
ACAD/Medre.A
|
175
|
+
REvil
|
176
|
+
INCONTROLLER
|
177
|
+
KillDisk
|
178
|
+
Industroyer
|
179
|
+
Flame
|
180
|
+
None
|
181
|
+
Virtual Private Network (VPN) Server
|
182
|
+
Jump Host
|
183
|
+
Remote Terminal Unit (RTU)
|
184
|
+
Field I/O
|
185
|
+
Human-Machine Interface (HMI)
|
186
|
+
Data Gateway
|
187
|
+
Safety Controller
|
188
|
+
Intelligent Electronic Device (IED)
|
189
|
+
Application Server
|
190
|
+
Programmable Logic Controller (PLC)
|
191
|
+
Routers
|
192
|
+
Data Historian
|
193
|
+
Control Server
|
194
|
+
Workstation
|
195
|
+
Windows Registry Key Deletion
|
196
|
+
Network Connection Creation
|
197
|
+
File Access
|
198
|
+
File Creation
|
199
|
+
Network Traffic Content
|
200
|
+
Logon Session Metadata
|
201
|
+
Process Creation
|
202
|
+
Drive Creation
|
203
|
+
Process/Event Alarm
|
204
|
+
Drive Modification
|
205
|
+
Service Creation
|
206
|
+
Process Termination
|
207
|
+
File Metadata
|
208
|
+
Service Modification
|
209
|
+
Command Execution
|
210
|
+
Service Metadata
|
211
|
+
Scheduled Job Metadata
|
212
|
+
File Modification
|
213
|
+
Software
|
214
|
+
Process History/Live Data
|
215
|
+
OS API Execution
|
216
|
+
Application Log Content
|
217
|
+
Logon Session Creation
|
218
|
+
Device Alarm
|
219
|
+
Script Execution
|
220
|
+
Network Traffic Flow
|
221
|
+
User Account Authentication
|
222
|
+
Asset Inventory
|
223
|
+
Firmware Modification
|
224
|
+
Module Load
|
225
|
+
Windows Registry Key Modification
|
226
|
+
File Deletion
|
227
|
+
Process Metadata
|
228
|
+
Scheduled Job Creation
|
229
|
+
Network Share Access
|
230
|
+
Scheduled Job Modification
|
231
|
+
User Account
|
232
|
+
Windows Registry
|
233
|
+
Script
|
234
|
+
Operational Databases
|
235
|
+
Application Log
|
236
|
+
Logon Session
|
237
|
+
File
|
238
|
+
Drive
|
239
|
+
Command
|
240
|
+
Asset
|
241
|
+
Network Share
|
242
|
+
Network Traffic
|
243
|
+
Scheduled Job
|
244
|
+
Firmware
|
245
|
+
Service
|
246
|
+
Process
|
247
|
+
Module
|
248
|
+
Inhibit Response Function
|
249
|
+
Privilege Escalation
|
250
|
+
Lateral Movement
|
251
|
+
Discovery
|
252
|
+
Initial Access
|
253
|
+
Impact
|
254
|
+
Persistence
|
255
|
+
Execution
|
256
|
+
Command and Control
|
257
|
+
Collection
|
258
|
+
Evasion
|
259
|
+
Impair Process Control
|
260
|
+
Network Intrusion Prevention
|
261
|
+
Vulnerability Scanning
|
262
|
+
Limit Access to Resource Over Network
|
263
|
+
Filter Network Traffic
|
264
|
+
Restrict Web-Based Content
|
265
|
+
Application Developer Guidance
|
266
|
+
Limit Hardware Installation
|
267
|
+
User Training
|
268
|
+
Operating System Configuration
|
269
|
+
Data Backup
|
270
|
+
Execution Prevention
|
271
|
+
Code Signing
|
272
|
+
SSL/TLS Inspection
|
273
|
+
Boot Integrity
|
274
|
+
Network Segmentation
|
275
|
+
Threat Intelligence Program
|
276
|
+
Password Policies
|
277
|
+
User Account Management
|
278
|
+
Restrict File and Directory Permissions
|
279
|
+
Privileged Account Management
|
280
|
+
Restrict Registry Permissions
|
281
|
+
Antivirus/Antimalware
|
282
|
+
Multi-factor Authentication
|
283
|
+
Software Configuration
|
284
|
+
Application Isolation and Sandboxing
|
285
|
+
Audit
|
286
|
+
Exploit Protection
|
287
|
+
Active Directory Configuration
|
288
|
+
Update Software
|
289
|
+
Restrict Library Loading
|
290
|
+
Disable or Remove Feature or Program
|
291
|
+
Account Use Policies
|
292
|
+
Encrypt Sensitive Information
|
293
|
+
Leafminer
|