txt2stix 0.0.4__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- txt2stix/__init__.py +33 -0
- txt2stix/ai_extractor/__init__.py +15 -0
- txt2stix/ai_extractor/anthropic.py +12 -0
- txt2stix/ai_extractor/base.py +87 -0
- txt2stix/ai_extractor/deepseek.py +19 -0
- txt2stix/ai_extractor/gemini.py +18 -0
- txt2stix/ai_extractor/openai.py +15 -0
- txt2stix/ai_extractor/openrouter.py +20 -0
- txt2stix/ai_extractor/prompts.py +164 -0
- txt2stix/ai_extractor/utils.py +85 -0
- txt2stix/attack_flow.py +101 -0
- txt2stix/bundler.py +428 -0
- txt2stix/common.py +23 -0
- txt2stix/extractions.py +59 -0
- txt2stix/includes/__init__.py +0 -0
- txt2stix/includes/extractions/ai/config.yaml +1023 -0
- txt2stix/includes/extractions/lookup/config.yaml +393 -0
- txt2stix/includes/extractions/pattern/config.yaml +609 -0
- txt2stix/includes/helpers/mimetype_filename_extension_list.csv +936 -0
- txt2stix/includes/helpers/stix_relationship_types.txt +41 -0
- txt2stix/includes/helpers/tlds.txt +1446 -0
- txt2stix/includes/helpers/windows_registry_key_prefix.txt +12 -0
- txt2stix/includes/lookups/_README.md +11 -0
- txt2stix/includes/lookups/_generate_lookups.py +247 -0
- txt2stix/includes/lookups/attack_pattern.txt +1 -0
- txt2stix/includes/lookups/campaign.txt +1 -0
- txt2stix/includes/lookups/country_iso3166_alpha2.txt +249 -0
- txt2stix/includes/lookups/course_of_action.txt +1 -0
- txt2stix/includes/lookups/disarm_id_v1_5.txt +345 -0
- txt2stix/includes/lookups/disarm_name_v1_5.txt +347 -0
- txt2stix/includes/lookups/extensions.txt +78 -0
- txt2stix/includes/lookups/identity.txt +1 -0
- txt2stix/includes/lookups/infrastructure.txt +1 -0
- txt2stix/includes/lookups/intrusion_set.txt +1 -0
- txt2stix/includes/lookups/malware.txt +2 -0
- txt2stix/includes/lookups/mitre_atlas_id_v4_5_2.txt +116 -0
- txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +117 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_aliases_v16_0.txt +1502 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +1656 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +1765 -0
- txt2stix/includes/lookups/mitre_attack_ics_aliases_v16_0.txt +141 -0
- txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +254 -0
- txt2stix/includes/lookups/mitre_attack_ics_name_v16_0.txt +293 -0
- txt2stix/includes/lookups/mitre_attack_mobile_aliases_v16_0.txt +159 -0
- txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +277 -0
- txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +296 -0
- txt2stix/includes/lookups/mitre_capec_id_v3_9.txt +559 -0
- txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +560 -0
- txt2stix/includes/lookups/mitre_cwe_id_v4_15.txt +939 -0
- txt2stix/includes/lookups/mitre_cwe_name_v4_15.txt +939 -0
- txt2stix/includes/lookups/threat_actor.txt +1 -0
- txt2stix/includes/lookups/tld.txt +1422 -0
- txt2stix/includes/lookups/tool.txt +1 -0
- txt2stix/includes/tests/test_cases.yaml +695 -0
- txt2stix/indicator.py +860 -0
- txt2stix/lookups.py +68 -0
- txt2stix/pattern/__init__.py +13 -0
- txt2stix/pattern/extractors/__init__.py +0 -0
- txt2stix/pattern/extractors/base_extractor.py +167 -0
- txt2stix/pattern/extractors/card/README.md +34 -0
- txt2stix/pattern/extractors/card/__init__.py +15 -0
- txt2stix/pattern/extractors/card/amex_card_extractor.py +52 -0
- txt2stix/pattern/extractors/card/diners_card_extractor.py +47 -0
- txt2stix/pattern/extractors/card/discover_card_extractor.py +48 -0
- txt2stix/pattern/extractors/card/jcb_card_extractor.py +43 -0
- txt2stix/pattern/extractors/card/master_card_extractor.py +63 -0
- txt2stix/pattern/extractors/card/union_card_extractor.py +38 -0
- txt2stix/pattern/extractors/card/visa_card_extractor.py +46 -0
- txt2stix/pattern/extractors/crypto/__init__.py +3 -0
- txt2stix/pattern/extractors/crypto/btc_extractor.py +38 -0
- txt2stix/pattern/extractors/directory/__init__.py +10 -0
- txt2stix/pattern/extractors/directory/unix_directory_extractor.py +40 -0
- txt2stix/pattern/extractors/directory/unix_file_path_extractor.py +42 -0
- txt2stix/pattern/extractors/directory/windows_directory_path_extractor.py +47 -0
- txt2stix/pattern/extractors/directory/windows_file_path_extractor.py +42 -0
- txt2stix/pattern/extractors/domain/__init__.py +8 -0
- txt2stix/pattern/extractors/domain/domain_extractor.py +39 -0
- txt2stix/pattern/extractors/domain/hostname_extractor.py +36 -0
- txt2stix/pattern/extractors/domain/sub_domain_extractor.py +49 -0
- txt2stix/pattern/extractors/hashes/__init__.py +16 -0
- txt2stix/pattern/extractors/hashes/md5_extractor.py +16 -0
- txt2stix/pattern/extractors/hashes/sha1_extractor.py +14 -0
- txt2stix/pattern/extractors/hashes/sha224_extractor.py +18 -0
- txt2stix/pattern/extractors/hashes/sha2_256_exactor.py +14 -0
- txt2stix/pattern/extractors/hashes/sha2_512_exactor.py +13 -0
- txt2stix/pattern/extractors/hashes/sha3_256_exactor.py +15 -0
- txt2stix/pattern/extractors/hashes/sha3_512_exactor.py +16 -0
- txt2stix/pattern/extractors/helper.py +64 -0
- txt2stix/pattern/extractors/ip/__init__.py +14 -0
- txt2stix/pattern/extractors/ip/ipv4_cidr_extractor.py +49 -0
- txt2stix/pattern/extractors/ip/ipv4_extractor.py +18 -0
- txt2stix/pattern/extractors/ip/ipv4_port_extractor.py +42 -0
- txt2stix/pattern/extractors/ip/ipv6_cidr_extractor.py +18 -0
- txt2stix/pattern/extractors/ip/ipv6_extractor.py +16 -0
- txt2stix/pattern/extractors/ip/ipv6_port_extractor.py +46 -0
- txt2stix/pattern/extractors/others/__init__.py +22 -0
- txt2stix/pattern/extractors/others/asn_extractor.py +14 -0
- txt2stix/pattern/extractors/others/cpe_extractor.py +29 -0
- txt2stix/pattern/extractors/others/cve_extractor.py +14 -0
- txt2stix/pattern/extractors/others/email_extractor.py +21 -0
- txt2stix/pattern/extractors/others/filename_extractor.py +17 -0
- txt2stix/pattern/extractors/others/iban_extractor.py +15 -0
- txt2stix/pattern/extractors/others/mac_address_extractor.py +13 -0
- txt2stix/pattern/extractors/others/phonenumber_extractor.py +41 -0
- txt2stix/pattern/extractors/others/user_agent_extractor.py +20 -0
- txt2stix/pattern/extractors/others/windows_registry_key_extractor.py +18 -0
- txt2stix/pattern/extractors/url/__init__.py +7 -0
- txt2stix/pattern/extractors/url/url_extractor.py +22 -0
- txt2stix/pattern/extractors/url/url_file_extractor.py +21 -0
- txt2stix/pattern/extractors/url/url_path_extractor.py +74 -0
- txt2stix/retriever.py +126 -0
- txt2stix/stix.py +1 -0
- txt2stix/txt2stix.py +336 -0
- txt2stix/utils.py +86 -0
- txt2stix-0.0.4.dist-info/METADATA +190 -0
- txt2stix-0.0.4.dist-info/RECORD +119 -0
- txt2stix-0.0.4.dist-info/WHEEL +4 -0
- txt2stix-0.0.4.dist-info/entry_points.txt +2 -0
- txt2stix-0.0.4.dist-info/licenses/LICENSE +202 -0
@@ -0,0 +1,393 @@
|
|
1
|
+
# ====== LOOKUP EXTRACTIONS =====
|
2
|
+
|
3
|
+
####### County extractions #######
|
4
|
+
|
5
|
+
lookup_country_alpha2:
|
6
|
+
type: lookup
|
7
|
+
dogesec_web: false
|
8
|
+
name: 'Country Alpha2'
|
9
|
+
description: 'Extracts countries using ISO 3166-1 alpha2 codes'
|
10
|
+
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_country. This extractor is very dumb e.g the words `is` and `in` will result in extractions for Iceland and India'
|
11
|
+
file: 'lookups/country_iso3166_alpha2.txt'
|
12
|
+
created: 2020-01-01
|
13
|
+
modified: 2020-01-01
|
14
|
+
created_by: DOGESEC
|
15
|
+
version: 1.0.0
|
16
|
+
test_cases: generic_country_alpha2
|
17
|
+
stix_mapping: ctibutler-location
|
18
|
+
|
19
|
+
####### MITRE ATT&CK #######
|
20
|
+
|
21
|
+
lookup_mitre_attack_enterprise_id:
|
22
|
+
type: lookup
|
23
|
+
dogesec_web: false
|
24
|
+
name: 'MITRE ATT&CK Enterprise IDs'
|
25
|
+
description: 'Extracts MITRE ATT&CK Enterprise IDs from text. See lookup name for version used.'
|
26
|
+
notes: 'ai_mitre_attack_enterprise also exists but beware of hallucinations'
|
27
|
+
file: 'lookups/mitre_attack_enterprise_id_v16_0.txt'
|
28
|
+
created: 2020-01-01
|
29
|
+
modified: 2020-01-01
|
30
|
+
created_by: DOGESEC
|
31
|
+
version: 1.0.0
|
32
|
+
test_cases: generic_mitre_attack_enterprise
|
33
|
+
stix_mapping: ctibutler-mitre-attack-enterprise-id
|
34
|
+
|
35
|
+
lookup_mitre_attack_enterprise_name:
|
36
|
+
type: lookup
|
37
|
+
dogesec_web: false
|
38
|
+
name: 'MITRE ATT&CK Enterprise names'
|
39
|
+
description: 'Extracts MITRE ATT&CK Enterprise names from text. See lookup name for version used.'
|
40
|
+
notes: 'ai_mitre_attack_enterprise also exists but beware of hallucinations'
|
41
|
+
file: 'lookups/mitre_attack_enterprise_name_v16_0.txt'
|
42
|
+
created: 2020-01-01
|
43
|
+
modified: 2020-01-01
|
44
|
+
created_by: DOGESEC
|
45
|
+
version: 1.0.0
|
46
|
+
test_cases: generic_mitre_attack_enterprise_name
|
47
|
+
stix_mapping: ctibutler-mitre-attack-enterprise-name
|
48
|
+
|
49
|
+
lookup_mitre_attack_enterprise_alias:
|
50
|
+
type: lookup
|
51
|
+
dogesec_web: false
|
52
|
+
name: 'MITRE ATT&CK Enterprise alias'
|
53
|
+
description: 'Extracts MITRE ATT&CK Enterprise aliases from text. See lookup name for version used.'
|
54
|
+
notes: 'ai_mitre_attack_enterprise also exists but beware of hallucinations'
|
55
|
+
file: 'lookups/mitre_attack_enterprise_aliases_v16_0.txt'
|
56
|
+
created: 2020-01-01
|
57
|
+
modified: 2020-01-01
|
58
|
+
created_by: DOGESEC
|
59
|
+
version: 1.0.0
|
60
|
+
test_cases: generic_mitre_attack_enterprise_aliases
|
61
|
+
stix_mapping: ctibutler-mitre-attack-enterprise-aliases
|
62
|
+
|
63
|
+
lookup_mitre_attack_mobile_id:
|
64
|
+
type: lookup
|
65
|
+
dogesec_web: false
|
66
|
+
name: 'MITRE ATT&CK Mobile IDs'
|
67
|
+
description: 'Extracts MITRE ATT&CK Mobile IDs from text. See lookup name for version used.'
|
68
|
+
notes: 'ai_mitre_attack_mobile also exists but beware of hallucinations'
|
69
|
+
file: 'lookups/mitre_attack_mobile_id_v16_0.txt'
|
70
|
+
created: 2020-01-01
|
71
|
+
modified: 2020-01-01
|
72
|
+
created_by: DOGESEC
|
73
|
+
version: 1.0.0
|
74
|
+
test_cases: generic_mitre_attack_mobile
|
75
|
+
stix_mapping: ctibutler-mitre-attack-mobile-id
|
76
|
+
|
77
|
+
lookup_mitre_attack_mobile_name:
|
78
|
+
type: lookup
|
79
|
+
dogesec_web: false
|
80
|
+
name: 'MITRE ATT&CK Mobile names'
|
81
|
+
description: 'Extracts MITRE ATT&CK Mobile names from text. See lookup name for version used.'
|
82
|
+
notes: 'ai_mitre_attack_mobile also exists but beware of hallucinations'
|
83
|
+
file: 'lookups/mitre_attack_mobile_name_v16_0.txt'
|
84
|
+
created: 2020-01-01
|
85
|
+
modified: 2020-01-01
|
86
|
+
created_by: DOGESEC
|
87
|
+
version: 1.0.0
|
88
|
+
test_cases: generic_mitre_attack_mobile_name
|
89
|
+
stix_mapping: ctibutler-mitre-attack-mobile-name
|
90
|
+
|
91
|
+
lookup_mitre_attack_mobile_alias:
|
92
|
+
type: lookup
|
93
|
+
dogesec_web: false
|
94
|
+
name: 'MITRE ATT&CK Mobile alias'
|
95
|
+
description: 'Extracts MITRE ATT&CK Mobile aliases from text. See lookup name for version used.'
|
96
|
+
notes: 'ai_mitre_attack_mobile also exists but beware of hallucinations'
|
97
|
+
file: 'lookups/mitre_attack_mobile_aliases_v16_0.txt'
|
98
|
+
created: 2020-01-01
|
99
|
+
modified: 2020-01-01
|
100
|
+
created_by: DOGESEC
|
101
|
+
version: 1.0.0
|
102
|
+
test_cases: generic_mitre_attack_mobile_aliases
|
103
|
+
stix_mapping: ctibutler-mitre-attack-mobile-aliases
|
104
|
+
|
105
|
+
lookup_mitre_attack_ics_id:
|
106
|
+
type: lookup
|
107
|
+
dogesec_web: false
|
108
|
+
name: 'MITRE ATT&CK ICS IDs'
|
109
|
+
description: 'Extracts MITRE ATT&CK ICS names from text. See lookup name for version used.'
|
110
|
+
notes: 'ai_mitre_attack_ics also exists but beware of hallucinations'
|
111
|
+
file: 'lookups/mitre_attack_ics_id_v16_0.txt'
|
112
|
+
created: 2020-01-01
|
113
|
+
modified: 2020-01-01
|
114
|
+
created_by: DOGESEC
|
115
|
+
version: 1.0.0
|
116
|
+
test_cases: generic_mitre_attack_ics
|
117
|
+
stix_mapping: ctibutler-mitre-attack-ics-id
|
118
|
+
|
119
|
+
lookup_mitre_attack_ics_name:
|
120
|
+
type: lookup
|
121
|
+
dogesec_web: false
|
122
|
+
name: 'MITRE ATT&CK ICS names'
|
123
|
+
description: 'Extracts MITRE ATT&CK ICS names from text. See lookup name for version used.'
|
124
|
+
notes: 'ai_mitre_attack_ics also exists but beware of hallucinations'
|
125
|
+
file: 'lookups/mitre_attack_ics_name_v16_0.txt'
|
126
|
+
created: 2020-01-01
|
127
|
+
modified: 2020-01-01
|
128
|
+
created_by: DOGESEC
|
129
|
+
version: 1.0.0
|
130
|
+
test_cases: generic_mitre_attack_ics_name
|
131
|
+
stix_mapping: ctibutler-mitre-attack-ics-name
|
132
|
+
|
133
|
+
lookup_mitre_attack_ics_alias:
|
134
|
+
type: lookup
|
135
|
+
dogesec_web: false
|
136
|
+
name: 'MITRE ATT&CK ICS alias'
|
137
|
+
description: 'Extracts MITRE ATT&CK ICS aliases from text. See lookup name for version used.'
|
138
|
+
notes: 'ai_mitre_attack_ics also exists but beware of hallucinations'
|
139
|
+
file: 'lookups/mitre_attack_ics_aliases_v16_0.txt'
|
140
|
+
created: 2020-01-01
|
141
|
+
modified: 2020-01-01
|
142
|
+
created_by: DOGESEC
|
143
|
+
version: 1.0.0
|
144
|
+
test_cases: generic_mitre_attack_ics_aliases
|
145
|
+
stix_mapping: ctibutler-mitre-attack-ics-aliases
|
146
|
+
|
147
|
+
####### MITRE CAPEC #######
|
148
|
+
|
149
|
+
lookup_mitre_capec_id:
|
150
|
+
type: lookup
|
151
|
+
dogesec_web: false
|
152
|
+
name: 'MITRE CAPEC IDs'
|
153
|
+
description: 'Extracts MITRE CAPEC IDs from text. See lookup name for version used.'
|
154
|
+
notes: 'ai_mitre_capec also exists but beware of hallucinations'
|
155
|
+
file: 'lookups/mitre_capec_id_v3_9.txt'
|
156
|
+
created: 2020-01-01
|
157
|
+
modified: 2020-01-01
|
158
|
+
created_by: DOGESEC
|
159
|
+
version: 1.0.0
|
160
|
+
test_cases: generic_mitre_capec
|
161
|
+
stix_mapping: ctibutler-mitre-capec-id
|
162
|
+
|
163
|
+
lookup_mitre_capec_name:
|
164
|
+
type: lookup
|
165
|
+
dogesec_web: false
|
166
|
+
name: 'MITRE CAPEC names'
|
167
|
+
description: 'Extracts MITRE CAPEC names from text. See lookup name for version used.'
|
168
|
+
notes: 'ai_mitre_capec also exists but beware of hallucinations'
|
169
|
+
file: 'lookups/mitre_capec_name_v3_9.txt'
|
170
|
+
created: 2020-01-01
|
171
|
+
modified: 2020-01-01
|
172
|
+
created_by: DOGESEC
|
173
|
+
version: 1.0.0
|
174
|
+
test_cases: generic_mitre_capec_name
|
175
|
+
stix_mapping: ctibutler-mitre-capec-name
|
176
|
+
|
177
|
+
####### MITRE CWE #######
|
178
|
+
|
179
|
+
lookup_mitre_cwe_id:
|
180
|
+
type: lookup
|
181
|
+
dogesec_web: false
|
182
|
+
name: MITRE CWE IDs
|
183
|
+
description: 'Extracts MITRE CWE IDs from text. See lookup name for version used.'
|
184
|
+
notes: 'ai_mitre_cwe also exists but beware of hallucinations'
|
185
|
+
file: 'lookups/mitre_cwe_id_v4_15.txt'
|
186
|
+
created: 2020-01-01
|
187
|
+
modified: 2020-01-01
|
188
|
+
created_by: DOGESEC
|
189
|
+
version: 1.0.0
|
190
|
+
test_cases: generic_mitre_cwe
|
191
|
+
stix_mapping: ctibutler-mitre-cwe-id
|
192
|
+
|
193
|
+
lookup_mitre_cwe_name:
|
194
|
+
type: lookup
|
195
|
+
dogesec_web: false
|
196
|
+
name: MITRE CWE names
|
197
|
+
description: 'Extracts MITRE CWE names from text. See lookup name for version used.'
|
198
|
+
notes: 'ai_mitre_cwe also exists but beware of hallucinations'
|
199
|
+
file: 'lookups/mitre_cwe_name_v4_15.txt'
|
200
|
+
created: 2020-01-01
|
201
|
+
modified: 2020-01-01
|
202
|
+
created_by: DOGESEC
|
203
|
+
version: 1.0.0
|
204
|
+
test_cases: generic_mitre_cwe_name
|
205
|
+
stix_mapping: ctibutler-mitre-cwe-name
|
206
|
+
|
207
|
+
####### MITRE ATLAS #######
|
208
|
+
|
209
|
+
lookup_mitre_atlas_id:
|
210
|
+
type: lookup
|
211
|
+
dogesec_web: false
|
212
|
+
name: MITRE ATLAS IDs
|
213
|
+
description: 'Extracts MITRE ATLAS IDs from text. See lookup name for version used.'
|
214
|
+
notes: 'No corresponding AI version yet due to poor AI performance'
|
215
|
+
file: 'lookups/mitre_atlas_id_v4_5_2.txt'
|
216
|
+
created: 2020-01-01
|
217
|
+
modified: 2020-01-01
|
218
|
+
created_by: DOGESEC
|
219
|
+
version: 1.0.0
|
220
|
+
test_cases: generic_mitre_atlas
|
221
|
+
stix_mapping: ctibutler-mitre-atlas-id
|
222
|
+
|
223
|
+
lookup_mitre_atlas_name:
|
224
|
+
type: lookup
|
225
|
+
dogesec_web: false
|
226
|
+
name: MITRE ATLAS names
|
227
|
+
description: 'Extracts MITRE ATLAS names from text. See lookup name for version used.'
|
228
|
+
notes: 'No corresponding AI version yet due to poor AI performance'
|
229
|
+
file: 'lookups/mitre_atlas_name_v4_5_2.txt'
|
230
|
+
created: 2020-01-01
|
231
|
+
modified: 2020-01-01
|
232
|
+
created_by: DOGESEC
|
233
|
+
version: 1.0.0
|
234
|
+
test_cases: generic_mitre_atlas_name
|
235
|
+
stix_mapping: ctibutler-mitre-atlas-name
|
236
|
+
|
237
|
+
####### DISARM #######
|
238
|
+
|
239
|
+
lookup_disarm_id:
|
240
|
+
type: lookup
|
241
|
+
dogesec_web: false
|
242
|
+
name: DISARM IDs
|
243
|
+
description: 'Extracts DISARM IDs from text. See lookup name for version used.'
|
244
|
+
notes: 'No corresponding AI version yet due to poor AI performance'
|
245
|
+
file: 'lookups/disarm_id_v1_5.txt'
|
246
|
+
created: 2020-01-01
|
247
|
+
modified: 2020-01-01
|
248
|
+
created_by: DOGESEC
|
249
|
+
version: 1.0.0
|
250
|
+
test_cases: generic_disarm
|
251
|
+
stix_mapping: ctibutler-disarm-id
|
252
|
+
|
253
|
+
lookup_disarm_name:
|
254
|
+
type: lookup
|
255
|
+
dogesec_web: false
|
256
|
+
name: DISARM IDs
|
257
|
+
description: 'Extracts DISARM names from text. See lookup name for version used.'
|
258
|
+
notes: 'No corresponding AI version yet due to poor AI performance'
|
259
|
+
file: 'lookups/disarm_name_v1_5.txt'
|
260
|
+
created: 2020-01-01
|
261
|
+
modified: 2020-01-01
|
262
|
+
created_by: DOGESEC
|
263
|
+
version: 1.0.0
|
264
|
+
test_cases: generic_disarm_name
|
265
|
+
stix_mapping: ctibutler-disarm-name
|
266
|
+
|
267
|
+
####### Generic Extractions #######
|
268
|
+
|
269
|
+
lookup_attack_pattern:
|
270
|
+
type: lookup
|
271
|
+
dogesec_web: false
|
272
|
+
name: 'Attack Patterns'
|
273
|
+
description: 'Will extract all Attack Pattern entries found in the lookup file.'
|
274
|
+
notes: ''
|
275
|
+
file: 'lookups/attack_pattern.txt'
|
276
|
+
created: 2020-01-01
|
277
|
+
modified: 2020-01-01
|
278
|
+
created_by: DOGESEC
|
279
|
+
version: 1.0.0
|
280
|
+
test_cases: lookup_attack_pattern
|
281
|
+
stix_mapping: attack-pattern
|
282
|
+
|
283
|
+
lookup_campaign:
|
284
|
+
type: lookup
|
285
|
+
dogesec_web: false
|
286
|
+
name: 'Campaign'
|
287
|
+
description: 'Will extract all Campaign entries found in the lookup file.'
|
288
|
+
notes: ''
|
289
|
+
file: 'lookups/campaign.txt'
|
290
|
+
created: 2020-01-01
|
291
|
+
modified: 2020-01-01
|
292
|
+
created_by: DOGESEC
|
293
|
+
version: 1.0.0
|
294
|
+
test_cases: lookup_campaign
|
295
|
+
stix_mapping: campaign
|
296
|
+
|
297
|
+
lookup_course_of_action:
|
298
|
+
type: lookup
|
299
|
+
dogesec_web: false
|
300
|
+
name: 'Course of Action'
|
301
|
+
description: 'Will extract all Course of Action entries found in the lookup file.'
|
302
|
+
notes: ''
|
303
|
+
file: 'lookups/course_of_action.txt'
|
304
|
+
created: 2020-01-01
|
305
|
+
modified: 2020-01-01
|
306
|
+
created_by: DOGESEC
|
307
|
+
version: 1.0.0
|
308
|
+
test_cases: lookup_course_of_action
|
309
|
+
stix_mapping: course-of-action
|
310
|
+
|
311
|
+
lookup_identity:
|
312
|
+
type: lookup
|
313
|
+
dogesec_web: false
|
314
|
+
name: 'Identity'
|
315
|
+
description: 'Will extract all Identity entries found in the lookup file.'
|
316
|
+
notes: ''
|
317
|
+
file: 'lookups/identity.txt'
|
318
|
+
created: 2020-01-01
|
319
|
+
modified: 2020-01-01
|
320
|
+
created_by: DOGESEC
|
321
|
+
version: 1.0.0
|
322
|
+
test_cases: lookup_identity
|
323
|
+
stix_mapping: identity
|
324
|
+
|
325
|
+
lookup_infrastructure:
|
326
|
+
type: lookup
|
327
|
+
dogesec_web: false
|
328
|
+
name: 'Infrastructure'
|
329
|
+
description: 'Will extract all Infrastructure entries found in the lookup file.'
|
330
|
+
notes: ''
|
331
|
+
file: 'lookups/infrastructure.txt'
|
332
|
+
created: 2020-01-01
|
333
|
+
modified: 2020-01-01
|
334
|
+
created_by: DOGESEC
|
335
|
+
version: 1.0.0
|
336
|
+
test_cases: lookup_infrastructure
|
337
|
+
stix_mapping: infrastructure
|
338
|
+
|
339
|
+
lookup_intrusion_set:
|
340
|
+
type: lookup
|
341
|
+
dogesec_web: false
|
342
|
+
name: 'Intrustion Set'
|
343
|
+
description: 'Will extract all Intrustion Set entries found in the lookup file.'
|
344
|
+
notes: ''
|
345
|
+
file: 'lookups/intrusion_set.txt'
|
346
|
+
created: 2020-01-01
|
347
|
+
modified: 2020-01-01
|
348
|
+
created_by: DOGESEC
|
349
|
+
version: 1.0.0
|
350
|
+
test_cases: lookup_intrusion_set
|
351
|
+
stix_mapping: intrusion-set
|
352
|
+
|
353
|
+
lookup_malware:
|
354
|
+
type: lookup
|
355
|
+
dogesec_web: false
|
356
|
+
name: 'Malware'
|
357
|
+
description: 'Will extract all Malware entries found in the lookup file.'
|
358
|
+
notes: ''
|
359
|
+
file: 'lookups/malware.txt'
|
360
|
+
created: 2020-01-01
|
361
|
+
modified: 2020-01-01
|
362
|
+
created_by: DOGESEC
|
363
|
+
version: 1.0.0
|
364
|
+
test_cases: lookup_malware
|
365
|
+
stix_mapping: malware
|
366
|
+
|
367
|
+
lookup_threat_actor:
|
368
|
+
type: lookup
|
369
|
+
dogesec_web: false
|
370
|
+
name: 'Threat Actor'
|
371
|
+
description: 'Will extract all Threat Actor entries found in the lookup file.'
|
372
|
+
notes: ''
|
373
|
+
file: 'lookups/threat_actor.txt'
|
374
|
+
created: 2020-01-01
|
375
|
+
modified: 2020-01-01
|
376
|
+
created_by: DOGESEC
|
377
|
+
version: 1.0.0
|
378
|
+
test_cases: lookup_threat_actor
|
379
|
+
stix_mapping: threat-actor
|
380
|
+
|
381
|
+
lookup_tool:
|
382
|
+
type: lookup
|
383
|
+
dogesec_web: false
|
384
|
+
name: 'Tool'
|
385
|
+
description: 'Will extract all Tool entries found in the lookup file.'
|
386
|
+
notes: ''
|
387
|
+
file: 'lookups/tool.txt'
|
388
|
+
created: 2020-01-01
|
389
|
+
modified: 2020-01-01
|
390
|
+
created_by: DOGESEC
|
391
|
+
version: 1.0.0
|
392
|
+
test_cases: lookup_tool
|
393
|
+
stix_mapping: tool
|