txt2stix 0.0.4__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (119) hide show
  1. txt2stix/__init__.py +33 -0
  2. txt2stix/ai_extractor/__init__.py +15 -0
  3. txt2stix/ai_extractor/anthropic.py +12 -0
  4. txt2stix/ai_extractor/base.py +87 -0
  5. txt2stix/ai_extractor/deepseek.py +19 -0
  6. txt2stix/ai_extractor/gemini.py +18 -0
  7. txt2stix/ai_extractor/openai.py +15 -0
  8. txt2stix/ai_extractor/openrouter.py +20 -0
  9. txt2stix/ai_extractor/prompts.py +164 -0
  10. txt2stix/ai_extractor/utils.py +85 -0
  11. txt2stix/attack_flow.py +101 -0
  12. txt2stix/bundler.py +428 -0
  13. txt2stix/common.py +23 -0
  14. txt2stix/extractions.py +59 -0
  15. txt2stix/includes/__init__.py +0 -0
  16. txt2stix/includes/extractions/ai/config.yaml +1023 -0
  17. txt2stix/includes/extractions/lookup/config.yaml +393 -0
  18. txt2stix/includes/extractions/pattern/config.yaml +609 -0
  19. txt2stix/includes/helpers/mimetype_filename_extension_list.csv +936 -0
  20. txt2stix/includes/helpers/stix_relationship_types.txt +41 -0
  21. txt2stix/includes/helpers/tlds.txt +1446 -0
  22. txt2stix/includes/helpers/windows_registry_key_prefix.txt +12 -0
  23. txt2stix/includes/lookups/_README.md +11 -0
  24. txt2stix/includes/lookups/_generate_lookups.py +247 -0
  25. txt2stix/includes/lookups/attack_pattern.txt +1 -0
  26. txt2stix/includes/lookups/campaign.txt +1 -0
  27. txt2stix/includes/lookups/country_iso3166_alpha2.txt +249 -0
  28. txt2stix/includes/lookups/course_of_action.txt +1 -0
  29. txt2stix/includes/lookups/disarm_id_v1_5.txt +345 -0
  30. txt2stix/includes/lookups/disarm_name_v1_5.txt +347 -0
  31. txt2stix/includes/lookups/extensions.txt +78 -0
  32. txt2stix/includes/lookups/identity.txt +1 -0
  33. txt2stix/includes/lookups/infrastructure.txt +1 -0
  34. txt2stix/includes/lookups/intrusion_set.txt +1 -0
  35. txt2stix/includes/lookups/malware.txt +2 -0
  36. txt2stix/includes/lookups/mitre_atlas_id_v4_5_2.txt +116 -0
  37. txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +117 -0
  38. txt2stix/includes/lookups/mitre_attack_enterprise_aliases_v16_0.txt +1502 -0
  39. txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +1656 -0
  40. txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +1765 -0
  41. txt2stix/includes/lookups/mitre_attack_ics_aliases_v16_0.txt +141 -0
  42. txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +254 -0
  43. txt2stix/includes/lookups/mitre_attack_ics_name_v16_0.txt +293 -0
  44. txt2stix/includes/lookups/mitre_attack_mobile_aliases_v16_0.txt +159 -0
  45. txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +277 -0
  46. txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +296 -0
  47. txt2stix/includes/lookups/mitre_capec_id_v3_9.txt +559 -0
  48. txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +560 -0
  49. txt2stix/includes/lookups/mitre_cwe_id_v4_15.txt +939 -0
  50. txt2stix/includes/lookups/mitre_cwe_name_v4_15.txt +939 -0
  51. txt2stix/includes/lookups/threat_actor.txt +1 -0
  52. txt2stix/includes/lookups/tld.txt +1422 -0
  53. txt2stix/includes/lookups/tool.txt +1 -0
  54. txt2stix/includes/tests/test_cases.yaml +695 -0
  55. txt2stix/indicator.py +860 -0
  56. txt2stix/lookups.py +68 -0
  57. txt2stix/pattern/__init__.py +13 -0
  58. txt2stix/pattern/extractors/__init__.py +0 -0
  59. txt2stix/pattern/extractors/base_extractor.py +167 -0
  60. txt2stix/pattern/extractors/card/README.md +34 -0
  61. txt2stix/pattern/extractors/card/__init__.py +15 -0
  62. txt2stix/pattern/extractors/card/amex_card_extractor.py +52 -0
  63. txt2stix/pattern/extractors/card/diners_card_extractor.py +47 -0
  64. txt2stix/pattern/extractors/card/discover_card_extractor.py +48 -0
  65. txt2stix/pattern/extractors/card/jcb_card_extractor.py +43 -0
  66. txt2stix/pattern/extractors/card/master_card_extractor.py +63 -0
  67. txt2stix/pattern/extractors/card/union_card_extractor.py +38 -0
  68. txt2stix/pattern/extractors/card/visa_card_extractor.py +46 -0
  69. txt2stix/pattern/extractors/crypto/__init__.py +3 -0
  70. txt2stix/pattern/extractors/crypto/btc_extractor.py +38 -0
  71. txt2stix/pattern/extractors/directory/__init__.py +10 -0
  72. txt2stix/pattern/extractors/directory/unix_directory_extractor.py +40 -0
  73. txt2stix/pattern/extractors/directory/unix_file_path_extractor.py +42 -0
  74. txt2stix/pattern/extractors/directory/windows_directory_path_extractor.py +47 -0
  75. txt2stix/pattern/extractors/directory/windows_file_path_extractor.py +42 -0
  76. txt2stix/pattern/extractors/domain/__init__.py +8 -0
  77. txt2stix/pattern/extractors/domain/domain_extractor.py +39 -0
  78. txt2stix/pattern/extractors/domain/hostname_extractor.py +36 -0
  79. txt2stix/pattern/extractors/domain/sub_domain_extractor.py +49 -0
  80. txt2stix/pattern/extractors/hashes/__init__.py +16 -0
  81. txt2stix/pattern/extractors/hashes/md5_extractor.py +16 -0
  82. txt2stix/pattern/extractors/hashes/sha1_extractor.py +14 -0
  83. txt2stix/pattern/extractors/hashes/sha224_extractor.py +18 -0
  84. txt2stix/pattern/extractors/hashes/sha2_256_exactor.py +14 -0
  85. txt2stix/pattern/extractors/hashes/sha2_512_exactor.py +13 -0
  86. txt2stix/pattern/extractors/hashes/sha3_256_exactor.py +15 -0
  87. txt2stix/pattern/extractors/hashes/sha3_512_exactor.py +16 -0
  88. txt2stix/pattern/extractors/helper.py +64 -0
  89. txt2stix/pattern/extractors/ip/__init__.py +14 -0
  90. txt2stix/pattern/extractors/ip/ipv4_cidr_extractor.py +49 -0
  91. txt2stix/pattern/extractors/ip/ipv4_extractor.py +18 -0
  92. txt2stix/pattern/extractors/ip/ipv4_port_extractor.py +42 -0
  93. txt2stix/pattern/extractors/ip/ipv6_cidr_extractor.py +18 -0
  94. txt2stix/pattern/extractors/ip/ipv6_extractor.py +16 -0
  95. txt2stix/pattern/extractors/ip/ipv6_port_extractor.py +46 -0
  96. txt2stix/pattern/extractors/others/__init__.py +22 -0
  97. txt2stix/pattern/extractors/others/asn_extractor.py +14 -0
  98. txt2stix/pattern/extractors/others/cpe_extractor.py +29 -0
  99. txt2stix/pattern/extractors/others/cve_extractor.py +14 -0
  100. txt2stix/pattern/extractors/others/email_extractor.py +21 -0
  101. txt2stix/pattern/extractors/others/filename_extractor.py +17 -0
  102. txt2stix/pattern/extractors/others/iban_extractor.py +15 -0
  103. txt2stix/pattern/extractors/others/mac_address_extractor.py +13 -0
  104. txt2stix/pattern/extractors/others/phonenumber_extractor.py +41 -0
  105. txt2stix/pattern/extractors/others/user_agent_extractor.py +20 -0
  106. txt2stix/pattern/extractors/others/windows_registry_key_extractor.py +18 -0
  107. txt2stix/pattern/extractors/url/__init__.py +7 -0
  108. txt2stix/pattern/extractors/url/url_extractor.py +22 -0
  109. txt2stix/pattern/extractors/url/url_file_extractor.py +21 -0
  110. txt2stix/pattern/extractors/url/url_path_extractor.py +74 -0
  111. txt2stix/retriever.py +126 -0
  112. txt2stix/stix.py +1 -0
  113. txt2stix/txt2stix.py +336 -0
  114. txt2stix/utils.py +86 -0
  115. txt2stix-0.0.4.dist-info/METADATA +190 -0
  116. txt2stix-0.0.4.dist-info/RECORD +119 -0
  117. txt2stix-0.0.4.dist-info/WHEEL +4 -0
  118. txt2stix-0.0.4.dist-info/entry_points.txt +2 -0
  119. txt2stix-0.0.4.dist-info/licenses/LICENSE +202 -0
@@ -0,0 +1,159 @@
1
+ Operation Dust Storm
2
+ C0033
3
+ Bouncing Golf
4
+ UNC788
5
+ Sandworm Team
6
+ ELECTRUM
7
+ Telebots
8
+ IRON VIKING
9
+ BlackEnergy (Group)
10
+ Quedagh
11
+ Voodoo Bear
12
+ IRIDIUM
13
+ Seashell Blizzard
14
+ FROZENBARENTS
15
+ APT44
16
+ Scattered Spider
17
+ Roasted 0ktapus
18
+ Octo Tempest
19
+ Storm-0875
20
+ Confucius
21
+ Confucius APT
22
+ MoustachedBouncer
23
+ BITTER
24
+ T-APT-17
25
+ APT-C-23
26
+ Mantis
27
+ Arid Viper
28
+ Desert Falcon
29
+ TAG-63
30
+ Grey Karkadann
31
+ Big Bang APT
32
+ Two-tailed Scorpion
33
+ Dark Caracal
34
+ Windshift
35
+ Bahamut
36
+ APT28
37
+ IRON TWILIGHT
38
+ SNAKEMACKEREL
39
+ Swallowtail
40
+ Group 74
41
+ Sednit
42
+ Sofacy
43
+ Pawn Storm
44
+ Fancy Bear
45
+ STRONTIUM
46
+ Tsar Team
47
+ Threat Group-4127
48
+ TG-4127
49
+ Forest Blizzard
50
+ FROZENLAKE
51
+ Earth Lusca
52
+ TAG-22
53
+ Charcoal Typhoon
54
+ CHROMIUM
55
+ ControlX
56
+ PROMETHIUM
57
+ StrongPity
58
+ CarbonSteal
59
+ Cerberus
60
+ DroidJack
61
+ Rotexy
62
+ Stealth Mango
63
+ GoldenEagle
64
+ FlixOnline
65
+ Bread
66
+ Joker
67
+ Hornbill
68
+ Gooligan
69
+ Ghost Push
70
+ SpyNote RAT
71
+ TrickMo
72
+ INSOMNIA
73
+ Dvmap
74
+ Zen
75
+ AhRat
76
+ XLoader for Android
77
+ XLoader for iOS
78
+ AbstractEmu
79
+ Chameleon
80
+ Exodus
81
+ Exodus One
82
+ Exodus Two
83
+ Dendroid
84
+ Desert Scorpion
85
+ Pegasus for iOS
86
+ Tangelo
87
+ RCSAndroid
88
+ Corona Updates
89
+ Wabi Music
90
+ Concipit1248
91
+ Skygofree
92
+ DoubleAgent
93
+ Twitoor
94
+ Fakecalls
95
+ S.O.V.A.
96
+ ANDROIDOS_ANSERVER.A
97
+ Mandrake
98
+ oxide
99
+ briar
100
+ ricinus
101
+ darkmatter
102
+ HilalRAT
103
+ DEFENSOR ID
104
+ BRATA
105
+ Ginp
106
+ eSurv
107
+ TangleBot
108
+ Monokle
109
+ Red Alert 2.0
110
+ ViceLeaker
111
+ Triout
112
+ FlyTrap
113
+ FakeSpy
114
+ SpyDealer
115
+ Pegasus for Android
116
+ Chrysaor
117
+ FrozenCell
118
+ AndroidOS/MalLocker.B
119
+ SharkBot
120
+ RedDrop
121
+ CHEMISTGAMES
122
+ YiSpecter
123
+ BOULDSPY
124
+ Anubis
125
+ AndroRAT
126
+ FinFisher
127
+ FinSpy
128
+ Agent Smith
129
+ Asacub
130
+ Trojan-SMS.AndroidOS.Smaps
131
+ GPlayed
132
+ EventBot
133
+ HenBox
134
+ Riltok
135
+ GolfSpy
136
+ Pallas
137
+ Circles
138
+ Tiktok Pro
139
+ HummingBad
140
+ Exobot
141
+ Android/Chuli.A
142
+ Charger
143
+ Drinik
144
+ SilkBean
145
+ WolfRAT
146
+ BusyGasper
147
+ TERRACOTTA
148
+ Escobar
149
+ Triada
150
+ Golden Cup
151
+ FluBot
152
+ ViperRAT
153
+ SimBad
154
+ Android/AdDisplay.Ashas
155
+ Phenakite
156
+ TianySpy
157
+ Sunbird
158
+ Gustuff
159
+ FlexiSpy
@@ -0,0 +1,277 @@
1
+ C0016
2
+ C0033
3
+ DS0009
4
+ DS0013
5
+ DS0017
6
+ DS0029
7
+ DS0041
8
+ DS0042
9
+ G0007
10
+ G0034
11
+ G0056
12
+ G0070
13
+ G0097
14
+ G0112
15
+ G0142
16
+ G1002
17
+ G1006
18
+ G1015
19
+ G1019
20
+ G1028
21
+ G1029
22
+ M1001
23
+ M1002
24
+ M1003
25
+ M1004
26
+ M1006
27
+ M1009
28
+ M1010
29
+ M1011
30
+ M1012
31
+ M1013
32
+ M1014
33
+ M1058
34
+ M1059
35
+ S0182
36
+ S0285
37
+ S0286
38
+ S0287
39
+ S0288
40
+ S0289
41
+ S0290
42
+ S0291
43
+ S0292
44
+ S0293
45
+ S0294
46
+ S0295
47
+ S0297
48
+ S0298
49
+ S0299
50
+ S0300
51
+ S0301
52
+ S0302
53
+ S0303
54
+ S0304
55
+ S0305
56
+ S0306
57
+ S0307
58
+ S0308
59
+ S0309
60
+ S0310
61
+ S0311
62
+ S0312
63
+ S0313
64
+ S0314
65
+ S0315
66
+ S0316
67
+ S0318
68
+ S0319
69
+ S0320
70
+ S0321
71
+ S0322
72
+ S0323
73
+ S0324
74
+ S0325
75
+ S0326
76
+ S0327
77
+ S0328
78
+ S0329
79
+ S0399
80
+ S0403
81
+ S0405
82
+ S0406
83
+ S0407
84
+ S0408
85
+ S0411
86
+ S0418
87
+ S0419
88
+ S0420
89
+ S0421
90
+ S0422
91
+ S0423
92
+ S0424
93
+ S0425
94
+ S0426
95
+ S0427
96
+ S0432
97
+ S0440
98
+ S0463
99
+ S0478
100
+ S0479
101
+ S0480
102
+ S0485
103
+ S0489
104
+ S0490
105
+ S0494
106
+ S0505
107
+ S0506
108
+ S0507
109
+ S0509
110
+ S0522
111
+ S0524
112
+ S0525
113
+ S0529
114
+ S0535
115
+ S0536
116
+ S0539
117
+ S0540
118
+ S0544
119
+ S0545
120
+ S0549
121
+ S0550
122
+ S0551
123
+ S0555
124
+ S0558
125
+ S0577
126
+ S0602
127
+ S0655
128
+ S1054
129
+ S1055
130
+ S1056
131
+ S1061
132
+ S1062
133
+ S1067
134
+ S1069
135
+ S1077
136
+ S1079
137
+ S1080
138
+ S1082
139
+ S1083
140
+ S1092
141
+ S1093
142
+ S1094
143
+ S1095
144
+ S1103
145
+ S1126
146
+ S1128
147
+ T1398
148
+ T1404
149
+ T1406
150
+ T1406.001
151
+ T1406.002
152
+ T1407
153
+ T1409
154
+ T1414
155
+ T1417
156
+ T1417.001
157
+ T1417.002
158
+ T1418
159
+ T1418.001
160
+ T1420
161
+ T1421
162
+ T1422
163
+ T1422.001
164
+ T1422.002
165
+ T1423
166
+ T1424
167
+ T1426
168
+ T1428
169
+ T1429
170
+ T1430
171
+ T1430.001
172
+ T1430.002
173
+ T1437
174
+ T1437.001
175
+ T1456
176
+ T1458
177
+ T1461
178
+ T1464
179
+ T1471
180
+ T1474
181
+ T1474.001
182
+ T1474.002
183
+ T1474.003
184
+ T1481
185
+ T1481.001
186
+ T1481.002
187
+ T1481.003
188
+ T1509
189
+ T1512
190
+ T1513
191
+ T1516
192
+ T1517
193
+ T1521
194
+ T1521.001
195
+ T1521.002
196
+ T1521.003
197
+ T1532
198
+ T1533
199
+ T1541
200
+ T1544
201
+ T1575
202
+ T1577
203
+ T1582
204
+ T1603
205
+ T1604
206
+ T1616
207
+ T1617
208
+ T1623
209
+ T1623.001
210
+ T1624
211
+ T1624.001
212
+ T1625
213
+ T1625.001
214
+ T1626
215
+ T1626.001
216
+ T1627
217
+ T1627.001
218
+ T1628
219
+ T1628.001
220
+ T1628.002
221
+ T1628.003
222
+ T1629
223
+ T1629.001
224
+ T1629.002
225
+ T1629.003
226
+ T1630
227
+ T1630.001
228
+ T1630.002
229
+ T1630.003
230
+ T1631
231
+ T1631.001
232
+ T1632
233
+ T1632.001
234
+ T1633
235
+ T1633.001
236
+ T1634
237
+ T1634.001
238
+ T1635
239
+ T1635.001
240
+ T1636
241
+ T1636.001
242
+ T1636.002
243
+ T1636.003
244
+ T1636.004
245
+ T1637
246
+ T1637.001
247
+ T1638
248
+ T1639
249
+ T1639.001
250
+ T1640
251
+ T1641
252
+ T1641.001
253
+ T1642
254
+ T1643
255
+ T1644
256
+ T1645
257
+ T1646
258
+ T1655
259
+ T1655.001
260
+ T1658
261
+ T1660
262
+ T1661
263
+ T1662
264
+ T1663
265
+ T1664
266
+ TA0027
267
+ TA0028
268
+ TA0029
269
+ TA0030
270
+ TA0031
271
+ TA0032
272
+ TA0033
273
+ TA0034
274
+ TA0035
275
+ TA0036
276
+ TA0037
277
+ TA0041
@@ -0,0 +1,296 @@
1
+ Mobile ATT&CK
2
+ Scheduled Task/Job
3
+ Adversary-in-the-Middle
4
+ Abuse Elevation Control Mechanism
5
+ Remote Access Software
6
+ Uninstall Malicious Application
7
+ Indicator Removal on Host
8
+ Supply Chain Compromise
9
+ Impersonate SS7 Nodes
10
+ Match Legitimate Name or Location
11
+ Protected User Data
12
+ Asymmetric Cryptography
13
+ Software Discovery
14
+ Process Discovery
15
+ Call Log
16
+ Security Software Discovery
17
+ Ptrace System Calls
18
+ Impair Defenses
19
+ Exploitation of Remote Services
20
+ Web Protocols
21
+ Steal Application Access Token
22
+ User Evasion
23
+ Virtualization/Sandbox Evasion
24
+ Application Versioning
25
+ Command and Scripting Interpreter
26
+ Disable or Modify Tools
27
+ Ingress Tool Transfer
28
+ Dynamic Resolution
29
+ Network Service Scanning
30
+ Exfiltration Over C2 Channel
31
+ Exploitation for Privilege Escalation
32
+ Call Control
33
+ Exfiltration Over Unencrypted Non-C2 Protocol
34
+ Broadcast Receivers
35
+ Access Notifications
36
+ Exfiltration Over Alternative Protocol
37
+ Internet Connection Discovery
38
+ Boot or Logon Initialization Scripts
39
+ Execution Guardrails
40
+ GUI Input Capture
41
+ Compromise Client Software Binary
42
+ Software Packing
43
+ Native API
44
+ Exploitation for Client Execution
45
+ Proxy Through Victim
46
+ Foreground Persistence
47
+ Replication Through Removable Media
48
+ Audio Capture
49
+ Hijack Execution Flow
50
+ Unix Shell
51
+ Application Layer Protocol
52
+ Download New Code at Runtime
53
+ Exploitation for Initial Access
54
+ System Checks
55
+ Stored Application Data
56
+ Screen Capture
57
+ Transmitted Data Manipulation
58
+ Compromise Software Dependencies and Development Tools
59
+ URI Hijacking
60
+ Subvert Trust Controls
61
+ Keychain
62
+ Bidirectional Communication
63
+ Non-Standard Port
64
+ Compromise Software Supply Chain
65
+ Dead Drop Resolver
66
+ Location Tracking
67
+ Device Administrator Permissions
68
+ Remote Device Management Services
69
+ Data Destruction
70
+ Input Capture
71
+ Generate Traffic from Victim
72
+ Disguise Root/Jailbreak Indicators
73
+ Calendar Entries
74
+ File Deletion
75
+ Device Lockout
76
+ Keylogging
77
+ SMS Control
78
+ Process Injection
79
+ Symmetric Cryptography
80
+ Wi-Fi Discovery
81
+ Compromise Hardware Supply Chain
82
+ Clipboard Data
83
+ Data Manipulation
84
+ SMS Messages
85
+ Web Service
86
+ System Runtime API Hijacking
87
+ Credentials from Password Store
88
+ Hooking
89
+ File and Directory Discovery
90
+ Obfuscated Files or Information
91
+ Input Injection
92
+ Network Denial of Service
93
+ Compromise Application Executable
94
+ Event Triggered Execution
95
+ System Network Configuration Discovery
96
+ Video Capture
97
+ One-Way Communication
98
+ Data Encrypted for Impact
99
+ Prevent Application Removal
100
+ System Network Connections Discovery
101
+ Phishing
102
+ SSL Pinning
103
+ Lockscreen Bypass
104
+ Contact List
105
+ Data from Local System
106
+ Account Access Removal
107
+ System Information Discovery
108
+ Archive Collected Data
109
+ Geofencing
110
+ Conceal Multimedia Files
111
+ Endpoint Denial of Service
112
+ Out of Band Data
113
+ Encrypted Channel
114
+ Suppress Application Icon
115
+ Masquerading
116
+ Steganography
117
+ Hide Artifacts
118
+ Code Signing Policy Modification
119
+ Domain Generation Algorithms
120
+ Drive-By Compromise
121
+ Operation Dust Storm
122
+ C0033
123
+ Use Recent OS Version
124
+ Application Developer Guidance
125
+ Enterprise Policy
126
+ User Guidance
127
+ Do Not Mitigate
128
+ Antivirus/Antimalware
129
+ System Partition Integrity
130
+ Encrypt Network Traffic
131
+ Lock Bootloader
132
+ Security Updates
133
+ Deploy Compromised Device Detection Method
134
+ Interconnection Filtering
135
+ Attestation
136
+ The MITRE Corporation
137
+ Bouncing Golf
138
+ UNC788
139
+ Sandworm Team
140
+ Scattered Spider
141
+ Confucius
142
+ MoustachedBouncer
143
+ BITTER
144
+ APT-C-23
145
+ Dark Caracal
146
+ Windshift
147
+ APT28
148
+ Earth Lusca
149
+ PROMETHIUM
150
+ CarbonSteal
151
+ Cerberus
152
+ DroidJack
153
+ Rotexy
154
+ Stealth Mango
155
+ Allwinner
156
+ GoldenEagle
157
+ FlixOnline
158
+ Bread
159
+ Hornbill
160
+ Judy
161
+ OldBoot
162
+ Gooligan
163
+ SpyNote RAT
164
+ TrickMo
165
+ INSOMNIA
166
+ Dvmap
167
+ Zen
168
+ NotCompatible
169
+ AhRat
170
+ XLoader for Android
171
+ Trojan-SMS.AndroidOS.FakeInst.a
172
+ XLoader for iOS
173
+ AbstractEmu
174
+ Chameleon
175
+ Exodus
176
+ Dendroid
177
+ WireLurker
178
+ Desert Scorpion
179
+ Pegasus for iOS
180
+ Tangelo
181
+ RCSAndroid
182
+ Corona Updates
183
+ Skygofree
184
+ KeyRaider
185
+ ZergHelper
186
+ DoubleAgent
187
+ Twitoor
188
+ Fakecalls
189
+ S.O.V.A.
190
+ ANDROIDOS_ANSERVER.A
191
+ DualToy
192
+ Mandrake
193
+ HilalRAT
194
+ X-Agent for Android
195
+ DEFENSOR ID
196
+ BRATA
197
+ MazarBOT
198
+ Ginp
199
+ HummingWhale
200
+ eSurv
201
+ TangleBot
202
+ Monokle
203
+ Red Alert 2.0
204
+ ViceLeaker
205
+ FlyTrap
206
+ FakeSpy
207
+ SpyDealer
208
+ Concipit1248
209
+ RuMMS
210
+ Pegasus for Android
211
+ FrozenCell
212
+ AndroidOS/MalLocker.B
213
+ SharkBot
214
+ RedDrop
215
+ CHEMISTGAMES
216
+ YiSpecter
217
+ Trojan-SMS.AndroidOS.Agent.ao
218
+ BOULDSPY
219
+ Anubis
220
+ AndroRAT
221
+ FinFisher
222
+ Agent Smith
223
+ Asacub
224
+ GPlayed
225
+ EventBot
226
+ HenBox
227
+ Riltok
228
+ GolfSpy
229
+ Pallas
230
+ Circles
231
+ Tiktok Pro
232
+ PJApps
233
+ ShiftyBug
234
+ HummingBad
235
+ Exobot
236
+ OBAD
237
+ Android/Chuli.A
238
+ Charger
239
+ Drinik
240
+ Trojan-SMS.AndroidOS.OpFake.a
241
+ XcodeGhost
242
+ SilkBean
243
+ WolfRAT
244
+ BusyGasper
245
+ BrainTest
246
+ TERRACOTTA
247
+ Escobar
248
+ Triada
249
+ Golden Cup
250
+ FluBot
251
+ ViperRAT
252
+ Adups
253
+ SimBad
254
+ Android/AdDisplay.Ashas
255
+ Phenakite
256
+ TianySpy
257
+ Sunbird
258
+ DressCode
259
+ Gustuff
260
+ None
261
+ FlexiSpy
262
+ Xbot
263
+ Network Connection Creation
264
+ Network Traffic Content
265
+ Process Creation
266
+ System Settings
267
+ API Calls
268
+ Application Assets
269
+ Process Termination
270
+ Command Execution
271
+ Protected Configuration
272
+ Network Communication
273
+ Host Status
274
+ Network Traffic Flow
275
+ Permissions Requests
276
+ System Notifications
277
+ Permissions Request
278
+ Process Metadata
279
+ Sensor Health
280
+ User Interface
281
+ Command
282
+ Network Traffic
283
+ Application Vetting
284
+ Process
285
+ Initial Access
286
+ Exfiltration
287
+ Persistence
288
+ Privilege Escalation
289
+ Command and Control
290
+ Execution
291
+ Impact
292
+ Credential Access
293
+ Collection
294
+ Lateral Movement
295
+ Defense Evasion
296
+ Discovery