txt2stix 0.0.4__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (119) hide show
  1. txt2stix/__init__.py +33 -0
  2. txt2stix/ai_extractor/__init__.py +15 -0
  3. txt2stix/ai_extractor/anthropic.py +12 -0
  4. txt2stix/ai_extractor/base.py +87 -0
  5. txt2stix/ai_extractor/deepseek.py +19 -0
  6. txt2stix/ai_extractor/gemini.py +18 -0
  7. txt2stix/ai_extractor/openai.py +15 -0
  8. txt2stix/ai_extractor/openrouter.py +20 -0
  9. txt2stix/ai_extractor/prompts.py +164 -0
  10. txt2stix/ai_extractor/utils.py +85 -0
  11. txt2stix/attack_flow.py +101 -0
  12. txt2stix/bundler.py +428 -0
  13. txt2stix/common.py +23 -0
  14. txt2stix/extractions.py +59 -0
  15. txt2stix/includes/__init__.py +0 -0
  16. txt2stix/includes/extractions/ai/config.yaml +1023 -0
  17. txt2stix/includes/extractions/lookup/config.yaml +393 -0
  18. txt2stix/includes/extractions/pattern/config.yaml +609 -0
  19. txt2stix/includes/helpers/mimetype_filename_extension_list.csv +936 -0
  20. txt2stix/includes/helpers/stix_relationship_types.txt +41 -0
  21. txt2stix/includes/helpers/tlds.txt +1446 -0
  22. txt2stix/includes/helpers/windows_registry_key_prefix.txt +12 -0
  23. txt2stix/includes/lookups/_README.md +11 -0
  24. txt2stix/includes/lookups/_generate_lookups.py +247 -0
  25. txt2stix/includes/lookups/attack_pattern.txt +1 -0
  26. txt2stix/includes/lookups/campaign.txt +1 -0
  27. txt2stix/includes/lookups/country_iso3166_alpha2.txt +249 -0
  28. txt2stix/includes/lookups/course_of_action.txt +1 -0
  29. txt2stix/includes/lookups/disarm_id_v1_5.txt +345 -0
  30. txt2stix/includes/lookups/disarm_name_v1_5.txt +347 -0
  31. txt2stix/includes/lookups/extensions.txt +78 -0
  32. txt2stix/includes/lookups/identity.txt +1 -0
  33. txt2stix/includes/lookups/infrastructure.txt +1 -0
  34. txt2stix/includes/lookups/intrusion_set.txt +1 -0
  35. txt2stix/includes/lookups/malware.txt +2 -0
  36. txt2stix/includes/lookups/mitre_atlas_id_v4_5_2.txt +116 -0
  37. txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +117 -0
  38. txt2stix/includes/lookups/mitre_attack_enterprise_aliases_v16_0.txt +1502 -0
  39. txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +1656 -0
  40. txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +1765 -0
  41. txt2stix/includes/lookups/mitre_attack_ics_aliases_v16_0.txt +141 -0
  42. txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +254 -0
  43. txt2stix/includes/lookups/mitre_attack_ics_name_v16_0.txt +293 -0
  44. txt2stix/includes/lookups/mitre_attack_mobile_aliases_v16_0.txt +159 -0
  45. txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +277 -0
  46. txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +296 -0
  47. txt2stix/includes/lookups/mitre_capec_id_v3_9.txt +559 -0
  48. txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +560 -0
  49. txt2stix/includes/lookups/mitre_cwe_id_v4_15.txt +939 -0
  50. txt2stix/includes/lookups/mitre_cwe_name_v4_15.txt +939 -0
  51. txt2stix/includes/lookups/threat_actor.txt +1 -0
  52. txt2stix/includes/lookups/tld.txt +1422 -0
  53. txt2stix/includes/lookups/tool.txt +1 -0
  54. txt2stix/includes/tests/test_cases.yaml +695 -0
  55. txt2stix/indicator.py +860 -0
  56. txt2stix/lookups.py +68 -0
  57. txt2stix/pattern/__init__.py +13 -0
  58. txt2stix/pattern/extractors/__init__.py +0 -0
  59. txt2stix/pattern/extractors/base_extractor.py +167 -0
  60. txt2stix/pattern/extractors/card/README.md +34 -0
  61. txt2stix/pattern/extractors/card/__init__.py +15 -0
  62. txt2stix/pattern/extractors/card/amex_card_extractor.py +52 -0
  63. txt2stix/pattern/extractors/card/diners_card_extractor.py +47 -0
  64. txt2stix/pattern/extractors/card/discover_card_extractor.py +48 -0
  65. txt2stix/pattern/extractors/card/jcb_card_extractor.py +43 -0
  66. txt2stix/pattern/extractors/card/master_card_extractor.py +63 -0
  67. txt2stix/pattern/extractors/card/union_card_extractor.py +38 -0
  68. txt2stix/pattern/extractors/card/visa_card_extractor.py +46 -0
  69. txt2stix/pattern/extractors/crypto/__init__.py +3 -0
  70. txt2stix/pattern/extractors/crypto/btc_extractor.py +38 -0
  71. txt2stix/pattern/extractors/directory/__init__.py +10 -0
  72. txt2stix/pattern/extractors/directory/unix_directory_extractor.py +40 -0
  73. txt2stix/pattern/extractors/directory/unix_file_path_extractor.py +42 -0
  74. txt2stix/pattern/extractors/directory/windows_directory_path_extractor.py +47 -0
  75. txt2stix/pattern/extractors/directory/windows_file_path_extractor.py +42 -0
  76. txt2stix/pattern/extractors/domain/__init__.py +8 -0
  77. txt2stix/pattern/extractors/domain/domain_extractor.py +39 -0
  78. txt2stix/pattern/extractors/domain/hostname_extractor.py +36 -0
  79. txt2stix/pattern/extractors/domain/sub_domain_extractor.py +49 -0
  80. txt2stix/pattern/extractors/hashes/__init__.py +16 -0
  81. txt2stix/pattern/extractors/hashes/md5_extractor.py +16 -0
  82. txt2stix/pattern/extractors/hashes/sha1_extractor.py +14 -0
  83. txt2stix/pattern/extractors/hashes/sha224_extractor.py +18 -0
  84. txt2stix/pattern/extractors/hashes/sha2_256_exactor.py +14 -0
  85. txt2stix/pattern/extractors/hashes/sha2_512_exactor.py +13 -0
  86. txt2stix/pattern/extractors/hashes/sha3_256_exactor.py +15 -0
  87. txt2stix/pattern/extractors/hashes/sha3_512_exactor.py +16 -0
  88. txt2stix/pattern/extractors/helper.py +64 -0
  89. txt2stix/pattern/extractors/ip/__init__.py +14 -0
  90. txt2stix/pattern/extractors/ip/ipv4_cidr_extractor.py +49 -0
  91. txt2stix/pattern/extractors/ip/ipv4_extractor.py +18 -0
  92. txt2stix/pattern/extractors/ip/ipv4_port_extractor.py +42 -0
  93. txt2stix/pattern/extractors/ip/ipv6_cidr_extractor.py +18 -0
  94. txt2stix/pattern/extractors/ip/ipv6_extractor.py +16 -0
  95. txt2stix/pattern/extractors/ip/ipv6_port_extractor.py +46 -0
  96. txt2stix/pattern/extractors/others/__init__.py +22 -0
  97. txt2stix/pattern/extractors/others/asn_extractor.py +14 -0
  98. txt2stix/pattern/extractors/others/cpe_extractor.py +29 -0
  99. txt2stix/pattern/extractors/others/cve_extractor.py +14 -0
  100. txt2stix/pattern/extractors/others/email_extractor.py +21 -0
  101. txt2stix/pattern/extractors/others/filename_extractor.py +17 -0
  102. txt2stix/pattern/extractors/others/iban_extractor.py +15 -0
  103. txt2stix/pattern/extractors/others/mac_address_extractor.py +13 -0
  104. txt2stix/pattern/extractors/others/phonenumber_extractor.py +41 -0
  105. txt2stix/pattern/extractors/others/user_agent_extractor.py +20 -0
  106. txt2stix/pattern/extractors/others/windows_registry_key_extractor.py +18 -0
  107. txt2stix/pattern/extractors/url/__init__.py +7 -0
  108. txt2stix/pattern/extractors/url/url_extractor.py +22 -0
  109. txt2stix/pattern/extractors/url/url_file_extractor.py +21 -0
  110. txt2stix/pattern/extractors/url/url_path_extractor.py +74 -0
  111. txt2stix/retriever.py +126 -0
  112. txt2stix/stix.py +1 -0
  113. txt2stix/txt2stix.py +336 -0
  114. txt2stix/utils.py +86 -0
  115. txt2stix-0.0.4.dist-info/METADATA +190 -0
  116. txt2stix-0.0.4.dist-info/RECORD +119 -0
  117. txt2stix-0.0.4.dist-info/WHEEL +4 -0
  118. txt2stix-0.0.4.dist-info/entry_points.txt +2 -0
  119. txt2stix-0.0.4.dist-info/licenses/LICENSE +202 -0
@@ -0,0 +1,393 @@
1
+ # ====== LOOKUP EXTRACTIONS =====
2
+
3
+ ####### County extractions #######
4
+
5
+ lookup_country_alpha2:
6
+ type: lookup
7
+ dogesec_web: false
8
+ name: 'Country Alpha2'
9
+ description: 'Extracts countries using ISO 3166-1 alpha2 codes'
10
+ notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_country. This extractor is very dumb e.g the words `is` and `in` will result in extractions for Iceland and India'
11
+ file: 'lookups/country_iso3166_alpha2.txt'
12
+ created: 2020-01-01
13
+ modified: 2020-01-01
14
+ created_by: DOGESEC
15
+ version: 1.0.0
16
+ test_cases: generic_country_alpha2
17
+ stix_mapping: ctibutler-location
18
+
19
+ ####### MITRE ATT&CK #######
20
+
21
+ lookup_mitre_attack_enterprise_id:
22
+ type: lookup
23
+ dogesec_web: false
24
+ name: 'MITRE ATT&CK Enterprise IDs'
25
+ description: 'Extracts MITRE ATT&CK Enterprise IDs from text. See lookup name for version used.'
26
+ notes: 'ai_mitre_attack_enterprise also exists but beware of hallucinations'
27
+ file: 'lookups/mitre_attack_enterprise_id_v16_0.txt'
28
+ created: 2020-01-01
29
+ modified: 2020-01-01
30
+ created_by: DOGESEC
31
+ version: 1.0.0
32
+ test_cases: generic_mitre_attack_enterprise
33
+ stix_mapping: ctibutler-mitre-attack-enterprise-id
34
+
35
+ lookup_mitre_attack_enterprise_name:
36
+ type: lookup
37
+ dogesec_web: false
38
+ name: 'MITRE ATT&CK Enterprise names'
39
+ description: 'Extracts MITRE ATT&CK Enterprise names from text. See lookup name for version used.'
40
+ notes: 'ai_mitre_attack_enterprise also exists but beware of hallucinations'
41
+ file: 'lookups/mitre_attack_enterprise_name_v16_0.txt'
42
+ created: 2020-01-01
43
+ modified: 2020-01-01
44
+ created_by: DOGESEC
45
+ version: 1.0.0
46
+ test_cases: generic_mitre_attack_enterprise_name
47
+ stix_mapping: ctibutler-mitre-attack-enterprise-name
48
+
49
+ lookup_mitre_attack_enterprise_alias:
50
+ type: lookup
51
+ dogesec_web: false
52
+ name: 'MITRE ATT&CK Enterprise alias'
53
+ description: 'Extracts MITRE ATT&CK Enterprise aliases from text. See lookup name for version used.'
54
+ notes: 'ai_mitre_attack_enterprise also exists but beware of hallucinations'
55
+ file: 'lookups/mitre_attack_enterprise_aliases_v16_0.txt'
56
+ created: 2020-01-01
57
+ modified: 2020-01-01
58
+ created_by: DOGESEC
59
+ version: 1.0.0
60
+ test_cases: generic_mitre_attack_enterprise_aliases
61
+ stix_mapping: ctibutler-mitre-attack-enterprise-aliases
62
+
63
+ lookup_mitre_attack_mobile_id:
64
+ type: lookup
65
+ dogesec_web: false
66
+ name: 'MITRE ATT&CK Mobile IDs'
67
+ description: 'Extracts MITRE ATT&CK Mobile IDs from text. See lookup name for version used.'
68
+ notes: 'ai_mitre_attack_mobile also exists but beware of hallucinations'
69
+ file: 'lookups/mitre_attack_mobile_id_v16_0.txt'
70
+ created: 2020-01-01
71
+ modified: 2020-01-01
72
+ created_by: DOGESEC
73
+ version: 1.0.0
74
+ test_cases: generic_mitre_attack_mobile
75
+ stix_mapping: ctibutler-mitre-attack-mobile-id
76
+
77
+ lookup_mitre_attack_mobile_name:
78
+ type: lookup
79
+ dogesec_web: false
80
+ name: 'MITRE ATT&CK Mobile names'
81
+ description: 'Extracts MITRE ATT&CK Mobile names from text. See lookup name for version used.'
82
+ notes: 'ai_mitre_attack_mobile also exists but beware of hallucinations'
83
+ file: 'lookups/mitre_attack_mobile_name_v16_0.txt'
84
+ created: 2020-01-01
85
+ modified: 2020-01-01
86
+ created_by: DOGESEC
87
+ version: 1.0.0
88
+ test_cases: generic_mitre_attack_mobile_name
89
+ stix_mapping: ctibutler-mitre-attack-mobile-name
90
+
91
+ lookup_mitre_attack_mobile_alias:
92
+ type: lookup
93
+ dogesec_web: false
94
+ name: 'MITRE ATT&CK Mobile alias'
95
+ description: 'Extracts MITRE ATT&CK Mobile aliases from text. See lookup name for version used.'
96
+ notes: 'ai_mitre_attack_mobile also exists but beware of hallucinations'
97
+ file: 'lookups/mitre_attack_mobile_aliases_v16_0.txt'
98
+ created: 2020-01-01
99
+ modified: 2020-01-01
100
+ created_by: DOGESEC
101
+ version: 1.0.0
102
+ test_cases: generic_mitre_attack_mobile_aliases
103
+ stix_mapping: ctibutler-mitre-attack-mobile-aliases
104
+
105
+ lookup_mitre_attack_ics_id:
106
+ type: lookup
107
+ dogesec_web: false
108
+ name: 'MITRE ATT&CK ICS IDs'
109
+ description: 'Extracts MITRE ATT&CK ICS names from text. See lookup name for version used.'
110
+ notes: 'ai_mitre_attack_ics also exists but beware of hallucinations'
111
+ file: 'lookups/mitre_attack_ics_id_v16_0.txt'
112
+ created: 2020-01-01
113
+ modified: 2020-01-01
114
+ created_by: DOGESEC
115
+ version: 1.0.0
116
+ test_cases: generic_mitre_attack_ics
117
+ stix_mapping: ctibutler-mitre-attack-ics-id
118
+
119
+ lookup_mitre_attack_ics_name:
120
+ type: lookup
121
+ dogesec_web: false
122
+ name: 'MITRE ATT&CK ICS names'
123
+ description: 'Extracts MITRE ATT&CK ICS names from text. See lookup name for version used.'
124
+ notes: 'ai_mitre_attack_ics also exists but beware of hallucinations'
125
+ file: 'lookups/mitre_attack_ics_name_v16_0.txt'
126
+ created: 2020-01-01
127
+ modified: 2020-01-01
128
+ created_by: DOGESEC
129
+ version: 1.0.0
130
+ test_cases: generic_mitre_attack_ics_name
131
+ stix_mapping: ctibutler-mitre-attack-ics-name
132
+
133
+ lookup_mitre_attack_ics_alias:
134
+ type: lookup
135
+ dogesec_web: false
136
+ name: 'MITRE ATT&CK ICS alias'
137
+ description: 'Extracts MITRE ATT&CK ICS aliases from text. See lookup name for version used.'
138
+ notes: 'ai_mitre_attack_ics also exists but beware of hallucinations'
139
+ file: 'lookups/mitre_attack_ics_aliases_v16_0.txt'
140
+ created: 2020-01-01
141
+ modified: 2020-01-01
142
+ created_by: DOGESEC
143
+ version: 1.0.0
144
+ test_cases: generic_mitre_attack_ics_aliases
145
+ stix_mapping: ctibutler-mitre-attack-ics-aliases
146
+
147
+ ####### MITRE CAPEC #######
148
+
149
+ lookup_mitre_capec_id:
150
+ type: lookup
151
+ dogesec_web: false
152
+ name: 'MITRE CAPEC IDs'
153
+ description: 'Extracts MITRE CAPEC IDs from text. See lookup name for version used.'
154
+ notes: 'ai_mitre_capec also exists but beware of hallucinations'
155
+ file: 'lookups/mitre_capec_id_v3_9.txt'
156
+ created: 2020-01-01
157
+ modified: 2020-01-01
158
+ created_by: DOGESEC
159
+ version: 1.0.0
160
+ test_cases: generic_mitre_capec
161
+ stix_mapping: ctibutler-mitre-capec-id
162
+
163
+ lookup_mitre_capec_name:
164
+ type: lookup
165
+ dogesec_web: false
166
+ name: 'MITRE CAPEC names'
167
+ description: 'Extracts MITRE CAPEC names from text. See lookup name for version used.'
168
+ notes: 'ai_mitre_capec also exists but beware of hallucinations'
169
+ file: 'lookups/mitre_capec_name_v3_9.txt'
170
+ created: 2020-01-01
171
+ modified: 2020-01-01
172
+ created_by: DOGESEC
173
+ version: 1.0.0
174
+ test_cases: generic_mitre_capec_name
175
+ stix_mapping: ctibutler-mitre-capec-name
176
+
177
+ ####### MITRE CWE #######
178
+
179
+ lookup_mitre_cwe_id:
180
+ type: lookup
181
+ dogesec_web: false
182
+ name: MITRE CWE IDs
183
+ description: 'Extracts MITRE CWE IDs from text. See lookup name for version used.'
184
+ notes: 'ai_mitre_cwe also exists but beware of hallucinations'
185
+ file: 'lookups/mitre_cwe_id_v4_15.txt'
186
+ created: 2020-01-01
187
+ modified: 2020-01-01
188
+ created_by: DOGESEC
189
+ version: 1.0.0
190
+ test_cases: generic_mitre_cwe
191
+ stix_mapping: ctibutler-mitre-cwe-id
192
+
193
+ lookup_mitre_cwe_name:
194
+ type: lookup
195
+ dogesec_web: false
196
+ name: MITRE CWE names
197
+ description: 'Extracts MITRE CWE names from text. See lookup name for version used.'
198
+ notes: 'ai_mitre_cwe also exists but beware of hallucinations'
199
+ file: 'lookups/mitre_cwe_name_v4_15.txt'
200
+ created: 2020-01-01
201
+ modified: 2020-01-01
202
+ created_by: DOGESEC
203
+ version: 1.0.0
204
+ test_cases: generic_mitre_cwe_name
205
+ stix_mapping: ctibutler-mitre-cwe-name
206
+
207
+ ####### MITRE ATLAS #######
208
+
209
+ lookup_mitre_atlas_id:
210
+ type: lookup
211
+ dogesec_web: false
212
+ name: MITRE ATLAS IDs
213
+ description: 'Extracts MITRE ATLAS IDs from text. See lookup name for version used.'
214
+ notes: 'No corresponding AI version yet due to poor AI performance'
215
+ file: 'lookups/mitre_atlas_id_v4_5_2.txt'
216
+ created: 2020-01-01
217
+ modified: 2020-01-01
218
+ created_by: DOGESEC
219
+ version: 1.0.0
220
+ test_cases: generic_mitre_atlas
221
+ stix_mapping: ctibutler-mitre-atlas-id
222
+
223
+ lookup_mitre_atlas_name:
224
+ type: lookup
225
+ dogesec_web: false
226
+ name: MITRE ATLAS names
227
+ description: 'Extracts MITRE ATLAS names from text. See lookup name for version used.'
228
+ notes: 'No corresponding AI version yet due to poor AI performance'
229
+ file: 'lookups/mitre_atlas_name_v4_5_2.txt'
230
+ created: 2020-01-01
231
+ modified: 2020-01-01
232
+ created_by: DOGESEC
233
+ version: 1.0.0
234
+ test_cases: generic_mitre_atlas_name
235
+ stix_mapping: ctibutler-mitre-atlas-name
236
+
237
+ ####### DISARM #######
238
+
239
+ lookup_disarm_id:
240
+ type: lookup
241
+ dogesec_web: false
242
+ name: DISARM IDs
243
+ description: 'Extracts DISARM IDs from text. See lookup name for version used.'
244
+ notes: 'No corresponding AI version yet due to poor AI performance'
245
+ file: 'lookups/disarm_id_v1_5.txt'
246
+ created: 2020-01-01
247
+ modified: 2020-01-01
248
+ created_by: DOGESEC
249
+ version: 1.0.0
250
+ test_cases: generic_disarm
251
+ stix_mapping: ctibutler-disarm-id
252
+
253
+ lookup_disarm_name:
254
+ type: lookup
255
+ dogesec_web: false
256
+ name: DISARM IDs
257
+ description: 'Extracts DISARM names from text. See lookup name for version used.'
258
+ notes: 'No corresponding AI version yet due to poor AI performance'
259
+ file: 'lookups/disarm_name_v1_5.txt'
260
+ created: 2020-01-01
261
+ modified: 2020-01-01
262
+ created_by: DOGESEC
263
+ version: 1.0.0
264
+ test_cases: generic_disarm_name
265
+ stix_mapping: ctibutler-disarm-name
266
+
267
+ ####### Generic Extractions #######
268
+
269
+ lookup_attack_pattern:
270
+ type: lookup
271
+ dogesec_web: false
272
+ name: 'Attack Patterns'
273
+ description: 'Will extract all Attack Pattern entries found in the lookup file.'
274
+ notes: ''
275
+ file: 'lookups/attack_pattern.txt'
276
+ created: 2020-01-01
277
+ modified: 2020-01-01
278
+ created_by: DOGESEC
279
+ version: 1.0.0
280
+ test_cases: lookup_attack_pattern
281
+ stix_mapping: attack-pattern
282
+
283
+ lookup_campaign:
284
+ type: lookup
285
+ dogesec_web: false
286
+ name: 'Campaign'
287
+ description: 'Will extract all Campaign entries found in the lookup file.'
288
+ notes: ''
289
+ file: 'lookups/campaign.txt'
290
+ created: 2020-01-01
291
+ modified: 2020-01-01
292
+ created_by: DOGESEC
293
+ version: 1.0.0
294
+ test_cases: lookup_campaign
295
+ stix_mapping: campaign
296
+
297
+ lookup_course_of_action:
298
+ type: lookup
299
+ dogesec_web: false
300
+ name: 'Course of Action'
301
+ description: 'Will extract all Course of Action entries found in the lookup file.'
302
+ notes: ''
303
+ file: 'lookups/course_of_action.txt'
304
+ created: 2020-01-01
305
+ modified: 2020-01-01
306
+ created_by: DOGESEC
307
+ version: 1.0.0
308
+ test_cases: lookup_course_of_action
309
+ stix_mapping: course-of-action
310
+
311
+ lookup_identity:
312
+ type: lookup
313
+ dogesec_web: false
314
+ name: 'Identity'
315
+ description: 'Will extract all Identity entries found in the lookup file.'
316
+ notes: ''
317
+ file: 'lookups/identity.txt'
318
+ created: 2020-01-01
319
+ modified: 2020-01-01
320
+ created_by: DOGESEC
321
+ version: 1.0.0
322
+ test_cases: lookup_identity
323
+ stix_mapping: identity
324
+
325
+ lookup_infrastructure:
326
+ type: lookup
327
+ dogesec_web: false
328
+ name: 'Infrastructure'
329
+ description: 'Will extract all Infrastructure entries found in the lookup file.'
330
+ notes: ''
331
+ file: 'lookups/infrastructure.txt'
332
+ created: 2020-01-01
333
+ modified: 2020-01-01
334
+ created_by: DOGESEC
335
+ version: 1.0.0
336
+ test_cases: lookup_infrastructure
337
+ stix_mapping: infrastructure
338
+
339
+ lookup_intrusion_set:
340
+ type: lookup
341
+ dogesec_web: false
342
+ name: 'Intrustion Set'
343
+ description: 'Will extract all Intrustion Set entries found in the lookup file.'
344
+ notes: ''
345
+ file: 'lookups/intrusion_set.txt'
346
+ created: 2020-01-01
347
+ modified: 2020-01-01
348
+ created_by: DOGESEC
349
+ version: 1.0.0
350
+ test_cases: lookup_intrusion_set
351
+ stix_mapping: intrusion-set
352
+
353
+ lookup_malware:
354
+ type: lookup
355
+ dogesec_web: false
356
+ name: 'Malware'
357
+ description: 'Will extract all Malware entries found in the lookup file.'
358
+ notes: ''
359
+ file: 'lookups/malware.txt'
360
+ created: 2020-01-01
361
+ modified: 2020-01-01
362
+ created_by: DOGESEC
363
+ version: 1.0.0
364
+ test_cases: lookup_malware
365
+ stix_mapping: malware
366
+
367
+ lookup_threat_actor:
368
+ type: lookup
369
+ dogesec_web: false
370
+ name: 'Threat Actor'
371
+ description: 'Will extract all Threat Actor entries found in the lookup file.'
372
+ notes: ''
373
+ file: 'lookups/threat_actor.txt'
374
+ created: 2020-01-01
375
+ modified: 2020-01-01
376
+ created_by: DOGESEC
377
+ version: 1.0.0
378
+ test_cases: lookup_threat_actor
379
+ stix_mapping: threat-actor
380
+
381
+ lookup_tool:
382
+ type: lookup
383
+ dogesec_web: false
384
+ name: 'Tool'
385
+ description: 'Will extract all Tool entries found in the lookup file.'
386
+ notes: ''
387
+ file: 'lookups/tool.txt'
388
+ created: 2020-01-01
389
+ modified: 2020-01-01
390
+ created_by: DOGESEC
391
+ version: 1.0.0
392
+ test_cases: lookup_tool
393
+ stix_mapping: tool