txt2stix 1.1.6__py3-none-any.whl → 1.1.8__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- txt2stix/ai_extractor/utils.py +4 -1
- txt2stix/includes/extractions/ai/config.yaml +61 -61
- txt2stix/includes/extractions/lookup/config.yaml +29 -29
- txt2stix/includes/extractions/pattern/config.yaml +44 -44
- {txt2stix-1.1.6.dist-info → txt2stix-1.1.8.dist-info}/METADATA +2 -1
- {txt2stix-1.1.6.dist-info → txt2stix-1.1.8.dist-info}/RECORD +9 -9
- {txt2stix-1.1.6.dist-info → txt2stix-1.1.8.dist-info}/WHEEL +0 -0
- {txt2stix-1.1.6.dist-info → txt2stix-1.1.8.dist-info}/entry_points.txt +0 -0
- {txt2stix-1.1.6.dist-info → txt2stix-1.1.8.dist-info}/licenses/LICENSE +0 -0
txt2stix/ai_extractor/utils.py
CHANGED
|
@@ -5,6 +5,8 @@ import logging
|
|
|
5
5
|
import dotenv
|
|
6
6
|
import textwrap
|
|
7
7
|
|
|
8
|
+
import json_repair
|
|
9
|
+
|
|
8
10
|
from ..extractions import Extractor
|
|
9
11
|
|
|
10
12
|
from pydantic import BaseModel, Field, RootModel
|
|
@@ -63,7 +65,8 @@ class ParserWithLogging(PydanticOutputParser):
|
|
|
63
65
|
print(text, file=f)
|
|
64
66
|
print("=================close=================" + "\n"*5, file=f)
|
|
65
67
|
logging.debug(f.getvalue())
|
|
66
|
-
|
|
68
|
+
repaired_json = json_repair.repair_json(text)
|
|
69
|
+
return super().parse(repaired_json)
|
|
67
70
|
|
|
68
71
|
def get_extractors_str(extractors):
|
|
69
72
|
extractor: Extractor = None
|
|
@@ -10,7 +10,7 @@ ai_ipv4_address_only:
|
|
|
10
10
|
notes: 'pattern_ipv4_address_only legacy extraction also exists if you cannot use AI'
|
|
11
11
|
created: 2020-01-01
|
|
12
12
|
modified: 2020-01-01
|
|
13
|
-
created_by:
|
|
13
|
+
created_by: dogesec
|
|
14
14
|
version: 1.0.0
|
|
15
15
|
prompt_base: 'Extract all IPv4 addresses from the text.'
|
|
16
16
|
prompt_helper: 'Do not include any IPv4s that contain a port or CIDR.'
|
|
@@ -26,7 +26,7 @@ ai_ipv4_address_cidr:
|
|
|
26
26
|
notes: 'pattern_ipv4_address_cidr legacy extraction also exists if you cannot use AI'
|
|
27
27
|
created: 2020-01-01
|
|
28
28
|
modified: 2020-01-01
|
|
29
|
-
created_by:
|
|
29
|
+
created_by: dogesec
|
|
30
30
|
version: 1.0.0
|
|
31
31
|
prompt_base: 'Extract all IPv4 addresses with a CIDR from the text. CIDR part must be >=0 <=32.'
|
|
32
32
|
prompt_helper: 'Do not include any IPs that do not have a CIDR.'
|
|
@@ -42,7 +42,7 @@ ai_ipv4_address_port:
|
|
|
42
42
|
notes: 'pattern_ipv4_address_port legacy extraction also exists if you cannot use AI'
|
|
43
43
|
created: 2020-01-01
|
|
44
44
|
modified: 2020-01-01
|
|
45
|
-
created_by:
|
|
45
|
+
created_by: dogesec
|
|
46
46
|
version: 1.0.0
|
|
47
47
|
prompt_base: 'Extract all IPv4 addresses with a port from the text. Port number part must be >=0 <=65535.'
|
|
48
48
|
prompt_helper: 'Do not include any IPv4s that do not contain a port number.'
|
|
@@ -60,7 +60,7 @@ ai_ipv6_address_only:
|
|
|
60
60
|
notes: 'pattern_ipv6_address_only legacy extraction also exists if you cannot use AI'
|
|
61
61
|
created: 2020-01-01
|
|
62
62
|
modified: 2020-01-01
|
|
63
|
-
created_by:
|
|
63
|
+
created_by: dogesec
|
|
64
64
|
version: 1.0.0
|
|
65
65
|
prompt_base: 'Extract all IPv6 addresses from the text.'
|
|
66
66
|
prompt_helper: 'Do not include any IPv6s that contain a port or CIDR.'
|
|
@@ -76,7 +76,7 @@ ai_ipv6_address_cidr:
|
|
|
76
76
|
notes: 'pattern_ipv6_address_cidr legacy extraction also exists if you cannot use AI'
|
|
77
77
|
created: 2020-01-01
|
|
78
78
|
modified: 2020-01-01
|
|
79
|
-
created_by:
|
|
79
|
+
created_by: dogesec
|
|
80
80
|
version: 1.0.0
|
|
81
81
|
prompt_base: 'Extract all IPv6 addresses with a CIDR from the text. CIDR part must be >=0 <=128.'
|
|
82
82
|
prompt_helper: 'Do not include any IPv6s that do not contain a CIDR'
|
|
@@ -92,7 +92,7 @@ ai_ipv6_address_port:
|
|
|
92
92
|
notes: 'pattern_ipv6_address_port legacy extraction also exists if you cannot use AI'
|
|
93
93
|
created: 2020-01-01
|
|
94
94
|
modified: 2020-01-01
|
|
95
|
-
created_by:
|
|
95
|
+
created_by: dogesec
|
|
96
96
|
version: 1.0.0
|
|
97
97
|
prompt_base: 'Extract all IPv6 addresses with a CIDR from the text. Port number part must be >=0 <=65535.'
|
|
98
98
|
prompt_helper: 'Do not include any IPv6s that do not contain a port number'
|
|
@@ -110,7 +110,7 @@ ai_domain_name_only:
|
|
|
110
110
|
notes: 'pattern_domain_name_only legacy extraction also exists if you cannot use AI'
|
|
111
111
|
created: 2020-01-01
|
|
112
112
|
modified: 2020-01-01
|
|
113
|
-
created_by:
|
|
113
|
+
created_by: dogesec
|
|
114
114
|
version: 1.0.0
|
|
115
115
|
prompt_base: 'Extract all valid root domain names from the text. Do not extract subdomains.'
|
|
116
116
|
prompt_helper: ''
|
|
@@ -126,7 +126,7 @@ ai_domain_name_subdomain:
|
|
|
126
126
|
notes: 'pattern_domain_name_subdomain legacy extraction also exists if you cannot use AI'
|
|
127
127
|
created: 2020-01-01
|
|
128
128
|
modified: 2020-01-01
|
|
129
|
-
created_by:
|
|
129
|
+
created_by: dogesec
|
|
130
130
|
version: 1.0.0
|
|
131
131
|
prompt_base: 'Extract all valid subdomain names from the text. Do not extract root domains.'
|
|
132
132
|
prompt_helper: ''
|
|
@@ -144,7 +144,7 @@ ai_url:
|
|
|
144
144
|
notes: 'pattern_url legacy extraction also exists if you cannot use AI'
|
|
145
145
|
created: 2020-01-01
|
|
146
146
|
modified: 2020-01-01
|
|
147
|
-
created_by:
|
|
147
|
+
created_by: dogesec
|
|
148
148
|
version: 1.0.0
|
|
149
149
|
prompt_base: 'Extract all URLs with no path/file extension from the text. If the sub/domain part is not an IP, then it must have a valid TLD.'
|
|
150
150
|
prompt_helper: ''
|
|
@@ -160,7 +160,7 @@ ai_url_file:
|
|
|
160
160
|
notes: 'pattern_url_file legacy extraction also exists if you cannot use AI'
|
|
161
161
|
created: 2020-01-01
|
|
162
162
|
modified: 2020-01-01
|
|
163
|
-
created_by:
|
|
163
|
+
created_by: dogesec
|
|
164
164
|
version: 1.0.0
|
|
165
165
|
prompt_base: 'Extract all URLs with file extension in path from the text. If the sub/domain part is not an IP, then it must have a valid TLD. The file must match valid filetype.'
|
|
166
166
|
prompt_helper: ''
|
|
@@ -176,7 +176,7 @@ ai_url_path:
|
|
|
176
176
|
notes: 'pattern_url_path legacy extraction also exists if you cannot use AI'
|
|
177
177
|
created: 2020-01-01
|
|
178
178
|
modified: 2020-01-01
|
|
179
|
-
created_by:
|
|
179
|
+
created_by: dogesec
|
|
180
180
|
version: 1.0.0
|
|
181
181
|
prompt_base: 'Extract all URLs without a file extension in their path from the text. If the sub/domain part is not an IP, then it must have a valid TLD.'
|
|
182
182
|
prompt_helper: ''
|
|
@@ -194,7 +194,7 @@ ai_host_name:
|
|
|
194
194
|
notes: 'pattern_host_name legacy extraction also exists if you cannot use AI'
|
|
195
195
|
created: 2020-01-01
|
|
196
196
|
modified: 2020-01-01
|
|
197
|
-
created_by:
|
|
197
|
+
created_by: dogesec
|
|
198
198
|
version: 1.0.0
|
|
199
199
|
prompt_base: 'Extract all hostnames from the text. Hostnames should not have a valid TLD extension (these are domains).'
|
|
200
200
|
prompt_helper: ''
|
|
@@ -210,7 +210,7 @@ ai_host_name_subdomain:
|
|
|
210
210
|
notes: 'pattern_host_name_subdomain legacy extraction also exists if you cannot use AI'
|
|
211
211
|
created: 2020-01-01
|
|
212
212
|
modified: 2020-01-01
|
|
213
|
-
created_by:
|
|
213
|
+
created_by: dogesec
|
|
214
214
|
version: 1.0.0
|
|
215
215
|
prompt_base: 'Extract all sub-hostnames from the text. Sub-hostnames should not have a valid TLD extension.'
|
|
216
216
|
prompt_helper: ''
|
|
@@ -226,7 +226,7 @@ ai_host_name_url:
|
|
|
226
226
|
notes: 'pattern_host_name_url legacy extraction also exists if you cannot use AI'
|
|
227
227
|
created: 2020-01-01
|
|
228
228
|
modified: 2020-01-01
|
|
229
|
-
created_by:
|
|
229
|
+
created_by: dogesec
|
|
230
230
|
version: 1.0.0
|
|
231
231
|
prompt_base: 'Extract all hostnames / sub-hostnames with full URLs from the text. All extractions should not have a valid TLD extension.'
|
|
232
232
|
prompt_helper: ''
|
|
@@ -242,7 +242,7 @@ ai_host_name_file:
|
|
|
242
242
|
notes: 'pattern_host_name_file legacy extraction also exists if you cannot use AI'
|
|
243
243
|
created: 2020-01-01
|
|
244
244
|
modified: 2020-01-01
|
|
245
|
-
created_by:
|
|
245
|
+
created_by: dogesec
|
|
246
246
|
version: 1.0.0
|
|
247
247
|
prompt_base: 'Extract all hostnames / sub-hostnames with full URLs from the text that contain a path to a valid file extension. All extractions should not have a valid TLD extension. All file extensions should be valid file extensions.'
|
|
248
248
|
prompt_helper: ''
|
|
@@ -258,7 +258,7 @@ ai_host_name_path:
|
|
|
258
258
|
notes: 'pattern_host_name_path legacy extraction also exists if you cannot use AI'
|
|
259
259
|
created: 2020-01-01
|
|
260
260
|
modified: 2020-01-01
|
|
261
|
-
created_by:
|
|
261
|
+
created_by: dogesec
|
|
262
262
|
version: 1.0.0
|
|
263
263
|
prompt_base: 'Extract all hostnames / sub-hostnames with full URLs (but do not contain a path to a file) from the text that. All extractions should not have a valid TLD extension. All file extensions should be valid file extensions.'
|
|
264
264
|
prompt_helper: ''
|
|
@@ -276,7 +276,7 @@ ai_directory_windows:
|
|
|
276
276
|
notes: 'pattern_directory_windows legacy extraction also exists if you cannot use AI'
|
|
277
277
|
created: 2020-01-01
|
|
278
278
|
modified: 2020-01-01
|
|
279
|
-
created_by:
|
|
279
|
+
created_by: dogesec
|
|
280
280
|
version: 1.0.0
|
|
281
281
|
prompt_base: 'Extract all Windows directory paths from the text.'
|
|
282
282
|
prompt_helper: ''
|
|
@@ -292,7 +292,7 @@ ai_directory_windows_with_file:
|
|
|
292
292
|
notes: 'pattern_directory_windows_with_file legacy extraction also exists if you cannot use AI'
|
|
293
293
|
created: 2020-01-01
|
|
294
294
|
modified: 2020-01-01
|
|
295
|
-
created_by:
|
|
295
|
+
created_by: dogesec
|
|
296
296
|
version: 1.0.0
|
|
297
297
|
prompt_base: 'Extract all Windows directory paths from the text that contain a path to a file. Ensure the file type extension is valid.'
|
|
298
298
|
prompt_helper: ''
|
|
@@ -308,7 +308,7 @@ ai_directory_unix:
|
|
|
308
308
|
notes: 'pattern_directory_unix legacy extraction also exists if you cannot use AI'
|
|
309
309
|
created: 2020-01-01
|
|
310
310
|
modified: 2020-01-01
|
|
311
|
-
created_by:
|
|
311
|
+
created_by: dogesec
|
|
312
312
|
version: 1.0.0
|
|
313
313
|
prompt_base: 'Extract all UNIX directory paths from the text.'
|
|
314
314
|
prompt_helper: ''
|
|
@@ -324,7 +324,7 @@ ai_directory_unix_file:
|
|
|
324
324
|
notes: 'pattern_directory_unix_file legacy extraction also exists if you cannot use AI'
|
|
325
325
|
created: 2020-01-01
|
|
326
326
|
modified: 2020-01-01
|
|
327
|
-
created_by:
|
|
327
|
+
created_by: dogesec
|
|
328
328
|
version: 1.0.0
|
|
329
329
|
prompt_base: 'Extract all UNIX directory paths from the text that contain a path to a file. Ensure the file type extension is valid.'
|
|
330
330
|
prompt_helper: ''
|
|
@@ -342,7 +342,7 @@ ai_file_name:
|
|
|
342
342
|
notes: 'pattern_file_name legacy extraction also exists if you cannot use AI'
|
|
343
343
|
created: 2020-01-01
|
|
344
344
|
modified: 2020-01-01
|
|
345
|
-
created_by:
|
|
345
|
+
created_by: dogesec
|
|
346
346
|
version: 1.0.0
|
|
347
347
|
prompt_base: 'Extract all file names from the text. Ensure the file type extension is valid.'
|
|
348
348
|
prompt_helper: ''
|
|
@@ -358,7 +358,7 @@ ai_file_hash_all:
|
|
|
358
358
|
notes: ''
|
|
359
359
|
created: 2020-01-01
|
|
360
360
|
modified: 2020-01-01
|
|
361
|
-
created_by:
|
|
361
|
+
created_by: dogesec
|
|
362
362
|
version: 1.0.0
|
|
363
363
|
prompt_base: 'Extract all MD5, SHA-1, SHA-224, SHA-256, SHA-384 and SHA-512 file hashes from the text.'
|
|
364
364
|
prompt_helper: ''
|
|
@@ -374,7 +374,7 @@ ai_file_hash_md5:
|
|
|
374
374
|
notes: 'pattern_file_hash_md5 legacy extraction also exists if you cannot use AI'
|
|
375
375
|
created: 2020-01-01
|
|
376
376
|
modified: 2020-01-01
|
|
377
|
-
created_by:
|
|
377
|
+
created_by: dogesec
|
|
378
378
|
version: 1.0.0
|
|
379
379
|
prompt_base: 'Extract all MD5 hashes from the text.'
|
|
380
380
|
prompt_helper: ''
|
|
@@ -390,7 +390,7 @@ ai_file_hash_sha_1:
|
|
|
390
390
|
notes: 'pattern_file_hash_sha_1 legacy extraction also exists if you cannot use AI'
|
|
391
391
|
created: 2020-01-01
|
|
392
392
|
modified: 2020-01-01
|
|
393
|
-
created_by:
|
|
393
|
+
created_by: dogesec
|
|
394
394
|
version: 1.0.0
|
|
395
395
|
prompt_base: 'Extract all SHA-1 hashes from the text.'
|
|
396
396
|
prompt_helper: ''
|
|
@@ -406,7 +406,7 @@ ai_file_hash_sha_256:
|
|
|
406
406
|
notes: 'pattern_file_hash_sha_256 legacy extraction also exists if you cannot use AI'
|
|
407
407
|
created: 2020-01-01
|
|
408
408
|
modified: 2020-01-01
|
|
409
|
-
created_by:
|
|
409
|
+
created_by: dogesec
|
|
410
410
|
version: 1.0.0
|
|
411
411
|
prompt_base: 'Extract all SHA-256 hashes from the text.'
|
|
412
412
|
prompt_helper: ''
|
|
@@ -422,7 +422,7 @@ ai_file_hash_sha_512:
|
|
|
422
422
|
notes: 'pattern_file_hash_sha_512 legacy extraction also exists if you cannot use AI'
|
|
423
423
|
created: 2020-01-01
|
|
424
424
|
modified: 2020-01-01
|
|
425
|
-
created_by:
|
|
425
|
+
created_by: dogesec
|
|
426
426
|
version: 1.0.0
|
|
427
427
|
prompt_base: 'Extract all SHA-512 hashes from the text.'
|
|
428
428
|
prompt_helper: ''
|
|
@@ -440,7 +440,7 @@ ai_email_address:
|
|
|
440
440
|
notes: 'pattern_email_address legacy extraction also exists if you cannot use AI'
|
|
441
441
|
created: 2020-01-01
|
|
442
442
|
modified: 2020-01-01
|
|
443
|
-
created_by:
|
|
443
|
+
created_by: dogesec
|
|
444
444
|
version: 1.0.0
|
|
445
445
|
prompt_base: 'Extract all email addresses from the text.'
|
|
446
446
|
prompt_helper: ''
|
|
@@ -458,7 +458,7 @@ ai_mac_address:
|
|
|
458
458
|
notes: 'pattern_mac_address legacy extraction also exists if you cannot use AI'
|
|
459
459
|
created: 2020-01-01
|
|
460
460
|
modified: 2020-01-01
|
|
461
|
-
created_by:
|
|
461
|
+
created_by: dogesec
|
|
462
462
|
version: 1.0.0
|
|
463
463
|
prompt_base: 'Extract all MAC addresses from the text.'
|
|
464
464
|
prompt_helper: ''
|
|
@@ -476,7 +476,7 @@ ai_windows_registry_key:
|
|
|
476
476
|
notes: 'pattern_windows_registry_key legacy extraction also exists if you cannot use AI'
|
|
477
477
|
created: 2020-01-01
|
|
478
478
|
modified: 2020-01-01
|
|
479
|
-
created_by:
|
|
479
|
+
created_by: dogesec
|
|
480
480
|
version: 1.0.0
|
|
481
481
|
prompt_base: 'Extract all Windows Registry Keys from the text.'
|
|
482
482
|
prompt_helper: ''
|
|
@@ -494,7 +494,7 @@ ai_user_agent:
|
|
|
494
494
|
notes: 'pattern_user_agent legacy extraction also exists if you cannot use AI'
|
|
495
495
|
created: 2020-01-01
|
|
496
496
|
modified: 2020-01-01
|
|
497
|
-
created_by:
|
|
497
|
+
created_by: dogesec
|
|
498
498
|
version: 1.0.0
|
|
499
499
|
prompt_base: 'Extract all user agents from the text.'
|
|
500
500
|
prompt_helper: ''
|
|
@@ -512,7 +512,7 @@ ai_autonomous_system_number:
|
|
|
512
512
|
notes: 'pattern_user_agent legacy extraction also exists if you cannot use AI'
|
|
513
513
|
created: 2020-01-01
|
|
514
514
|
modified: 2020-01-01
|
|
515
|
-
created_by:
|
|
515
|
+
created_by: dogesec
|
|
516
516
|
version: 1.0.0
|
|
517
517
|
prompt_base: 'Autonomous System Numbers (ASN)'
|
|
518
518
|
prompt_helper: ''
|
|
@@ -530,7 +530,7 @@ ai_cryptocurrency_btc_wallet:
|
|
|
530
530
|
notes: 'pattern_cryptocurrency_btc_wallet legacy extraction also exists if you cannot use AI'
|
|
531
531
|
created: 2020-01-01
|
|
532
532
|
modified: 2020-01-01
|
|
533
|
-
created_by:
|
|
533
|
+
created_by: dogesec
|
|
534
534
|
version: 1.0.0
|
|
535
535
|
prompt_base: 'Extract all Bitcoin Wallet hashes from the text.'
|
|
536
536
|
prompt_helper: ''
|
|
@@ -546,7 +546,7 @@ ai_cryptocurrency_btc_wallet_transaction:
|
|
|
546
546
|
notes: 'pattern_cryptocurrency_btc_wallet_transaction legacy extraction also exists if you cannot use AI'
|
|
547
547
|
created: 2020-01-01
|
|
548
548
|
modified: 2020-01-01
|
|
549
|
-
created_by:
|
|
549
|
+
created_by: dogesec
|
|
550
550
|
version: 1.0.0
|
|
551
551
|
prompt_base: 'Extract all Bitcoin transaction hashes from the text.'
|
|
552
552
|
prompt_helper: ''
|
|
@@ -562,7 +562,7 @@ ai_cryptocurrency_btc_transaction:
|
|
|
562
562
|
notes: 'pattern_cryptocurrency_btc_transaction legacy extraction also exists if you cannot use AI'
|
|
563
563
|
created: 2020-01-01
|
|
564
564
|
modified: 2020-01-01
|
|
565
|
-
created_by:
|
|
565
|
+
created_by: dogesec
|
|
566
566
|
version: 1.0.0
|
|
567
567
|
prompt_base: 'Extract all Bitcoin transaction hashes from the text.'
|
|
568
568
|
prompt_helper: ''
|
|
@@ -580,7 +580,7 @@ ai_cve_id:
|
|
|
580
580
|
notes: 'pattern_cve_id legacy extraction also exists if you cannot use AI'
|
|
581
581
|
created: 2020-01-01
|
|
582
582
|
modified: 2020-01-01
|
|
583
|
-
created_by:
|
|
583
|
+
created_by: dogesec
|
|
584
584
|
version: 1.0.0
|
|
585
585
|
prompt_base: 'Extract all CVE IDs from the text.'
|
|
586
586
|
prompt_helper: ''
|
|
@@ -598,7 +598,7 @@ ai_cpe_uri:
|
|
|
598
598
|
notes: 'pattern_cpe_uri legacy extraction also exists if you cannot use AI'
|
|
599
599
|
created: 2020-01-01
|
|
600
600
|
modified: 2020-01-01
|
|
601
|
-
created_by:
|
|
601
|
+
created_by: dogesec
|
|
602
602
|
version: 1.0.0
|
|
603
603
|
prompt_base: 'Extract all CPEs match strings from the text.'
|
|
604
604
|
prompt_helper: ''
|
|
@@ -616,7 +616,7 @@ ai_bank_card_all:
|
|
|
616
616
|
notes: ''
|
|
617
617
|
created: 2020-01-01
|
|
618
618
|
modified: 2020-01-01
|
|
619
|
-
created_by:
|
|
619
|
+
created_by: dogesec
|
|
620
620
|
version: 1.0.0
|
|
621
621
|
prompt_base: 'Extract all MasterCard, Visa, American Express, Union Pay, Diners, JCB, and Discover bank card numbers from the text.'
|
|
622
622
|
prompt_helper: ''
|
|
@@ -632,7 +632,7 @@ ai_bank_card_mastercard:
|
|
|
632
632
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use pattern_bank_card_mastercard (AI can be unpredictable with sensitive data)'
|
|
633
633
|
created: 2020-01-01
|
|
634
634
|
modified: 2020-01-01
|
|
635
|
-
created_by:
|
|
635
|
+
created_by: dogesec
|
|
636
636
|
version: 1.0.0
|
|
637
637
|
prompt_base: 'Extract all MasterCard card numbers from the text.'
|
|
638
638
|
prompt_helper: ''
|
|
@@ -648,7 +648,7 @@ ai_bank_card_visa:
|
|
|
648
648
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use pattern_bank_card_visa (AI can be unpredictable with sensitive data)'
|
|
649
649
|
created: 2020-01-01
|
|
650
650
|
modified: 2020-01-01
|
|
651
|
-
created_by:
|
|
651
|
+
created_by: dogesec
|
|
652
652
|
version: 1.0.0
|
|
653
653
|
prompt_base: 'Extract all Visa card numbers from the text.'
|
|
654
654
|
prompt_helper: ''
|
|
@@ -664,7 +664,7 @@ ai_bank_card_amex:
|
|
|
664
664
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use pattern_bank_card_amex (AI can be unpredictable with sensitive data)'
|
|
665
665
|
created: 2020-01-01
|
|
666
666
|
modified: 2020-01-01
|
|
667
|
-
created_by:
|
|
667
|
+
created_by: dogesec
|
|
668
668
|
version: 1.0.0
|
|
669
669
|
prompt_base: 'Extract all American Express card numbers from the text.'
|
|
670
670
|
prompt_helper: ''
|
|
@@ -680,7 +680,7 @@ ai_bank_card_union_pay:
|
|
|
680
680
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use pattern_bank_card_union_pay (AI can be unpredictable with sensitive data)'
|
|
681
681
|
created: 2020-01-01
|
|
682
682
|
modified: 2020-01-01
|
|
683
|
-
created_by:
|
|
683
|
+
created_by: dogesec
|
|
684
684
|
version: 1.0.0
|
|
685
685
|
prompt_base: 'Extract all Union Pay card numbers from the text.'
|
|
686
686
|
prompt_helper: ''
|
|
@@ -696,7 +696,7 @@ ai_bank_card_diners:
|
|
|
696
696
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use pattern_bank_card_diners (AI can be unpredictable with sensitive data)'
|
|
697
697
|
created: 2020-01-01
|
|
698
698
|
modified: 2020-01-01
|
|
699
|
-
created_by:
|
|
699
|
+
created_by: dogesec
|
|
700
700
|
version: 1.0.0
|
|
701
701
|
prompt_base: 'Extract all Diners card numbers from the text.'
|
|
702
702
|
prompt_helper: ''
|
|
@@ -712,7 +712,7 @@ ai_bank_card_jcb:
|
|
|
712
712
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use pattern_bank_card_jcb (AI can be unpredictable with sensitive data)'
|
|
713
713
|
created: 2020-01-01
|
|
714
714
|
modified: 2020-01-01
|
|
715
|
-
created_by:
|
|
715
|
+
created_by: dogesec
|
|
716
716
|
version: 1.0.0
|
|
717
717
|
prompt_base: 'Extract all JCB card numbers from the text.'
|
|
718
718
|
prompt_helper: ''
|
|
@@ -728,7 +728,7 @@ ai_bank_card_discover:
|
|
|
728
728
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use pattern_bank_card_discover (AI can be unpredictable with sensitive data)'
|
|
729
729
|
created: 2020-01-01
|
|
730
730
|
modified: 2020-01-01
|
|
731
|
-
created_by:
|
|
731
|
+
created_by: dogesec
|
|
732
732
|
version: 1.0.0
|
|
733
733
|
prompt_base: 'Extract all Discover card numbers from the text.'
|
|
734
734
|
prompt_helper: ''
|
|
@@ -746,7 +746,7 @@ ai_iban_number:
|
|
|
746
746
|
notes: 'pattern_iban_number legacy extraction also exists if you cannot use AI'
|
|
747
747
|
created: 2020-01-01
|
|
748
748
|
modified: 2020-01-01
|
|
749
|
-
created_by:
|
|
749
|
+
created_by: dogesec
|
|
750
750
|
version: 1.0.0
|
|
751
751
|
prompt_base: 'Extract all International Bank Account Numbers (IBAN) from the text.'
|
|
752
752
|
prompt_helper: 'If needed, you can read more about IBAN numbers with examples here: https://www.iban.com/structure'
|
|
@@ -764,7 +764,7 @@ ai_phone_number:
|
|
|
764
764
|
notes: 'pattern_phone_number legacy extraction also exists if you cannot use AI'
|
|
765
765
|
created: 2020-01-01
|
|
766
766
|
modified: 2020-01-01
|
|
767
|
-
created_by:
|
|
767
|
+
created_by: dogesec
|
|
768
768
|
version: 1.0.0
|
|
769
769
|
prompt_base: 'Extract all phone numbers from the text.'
|
|
770
770
|
prompt_helper: 'If needed, you can read more about the E.164 standard with examples here: https://en.wikipedia.org/wiki/E.164'
|
|
@@ -782,7 +782,7 @@ ai_country:
|
|
|
782
782
|
notes: 'lookup_country_alpha2 legacy extraction also exists if you cannot use AI'
|
|
783
783
|
created: 2020-01-01
|
|
784
784
|
modified: 2020-01-01
|
|
785
|
-
created_by:
|
|
785
|
+
created_by: dogesec
|
|
786
786
|
version: 1.0.0
|
|
787
787
|
prompt_base: 'Extract all countries described in the text, including countries printed as IS0-3166 Alpha2 and Alpha3 codes.'
|
|
788
788
|
prompt_helper: 'If you are unsure, you can read more about the standard here: https://www.iso.org/iso-3166-country-codes.html'
|
|
@@ -800,7 +800,7 @@ ai_mitre_attack_enterprise:
|
|
|
800
800
|
notes: 'lookup_mitre_attack_enterprise_id and lookup_mitre_attack_enterprise_name legacy extractions also exists if you cannot use AI'
|
|
801
801
|
created: 2020-01-01
|
|
802
802
|
modified: 2020-01-01
|
|
803
|
-
created_by:
|
|
803
|
+
created_by: dogesec
|
|
804
804
|
version: 1.0.0
|
|
805
805
|
prompt_base: 'Extract all references to MITRE ATT&CK Enterprise tactics, techniques, groups, data sources, mitigations, software, and campaigns described in the text. These references may not be explicit in the text so you should be careful to account for the natural language of the text your analysis. Do not include MITRE ATT&CK ICS or MITRE ATT&CK Mobile in the results.'
|
|
806
806
|
prompt_helper: 'If you are unsure, you can learn more about MITRE ATT&CK Enterprise here: https://attack.mitre.org/matrices/enterprise/'
|
|
@@ -816,7 +816,7 @@ ai_mitre_attack_mobile:
|
|
|
816
816
|
notes: 'lookup_mitre_attack_mobile_id and lookup_mitre_attack_mobile_name legacy extractions also exists if you cannot use AI'
|
|
817
817
|
created: 2020-01-01
|
|
818
818
|
modified: 2020-01-01
|
|
819
|
-
created_by:
|
|
819
|
+
created_by: dogesec
|
|
820
820
|
version: 1.0.0
|
|
821
821
|
prompt_base: 'Extract all references to MITRE ATT&CK Mobile tactics, techniques, groups, data sources, mitigations, software, and campaigns described in the text. These references may not be explicit in the text so you should be careful to account for the natural language of the text your analysis. Do not include MITRE ATT&CK ICS or MITRE ATT&CK Enterprise in the results.'
|
|
822
822
|
prompt_helper: 'If you are unsure, you can learn more about MITRE ATT&CK Enterprise here: https://attack.mitre.org/matrices/mobile/'
|
|
@@ -832,7 +832,7 @@ ai_mitre_attack_ics:
|
|
|
832
832
|
notes: 'lookup_mitre_attack_ics_id and lookup_mitre_attack_ics_name legacy extractions also exists if you cannot use AI'
|
|
833
833
|
created: 2020-01-01
|
|
834
834
|
modified: 2020-01-01
|
|
835
|
-
created_by:
|
|
835
|
+
created_by: dogesec
|
|
836
836
|
version: 1.0.0
|
|
837
837
|
prompt_base: 'Extract all references to MITRE ATT&CK ICS tactics, techniques, groups, data sources, mitigations, software, and campaigns described in the text. These references may not be explicit in the text so you should be careful to account for the natural language of the text your analysis. Do not include MITRE ATT&CK Mobile or MITRE ATT&CK Enterprise in the results.'
|
|
838
838
|
prompt_helper: 'If you are unsure, you can learn more about MITRE ATT&CK Enterprise here: https://attack.mitre.org/matrices/ics/'
|
|
@@ -850,7 +850,7 @@ ai_mitre_capec:
|
|
|
850
850
|
notes: 'lookup_mitre_capec_id and lookup_mitre_capec_name legacy extractions also exists if you cannot use AI'
|
|
851
851
|
created: 2020-01-01
|
|
852
852
|
modified: 2020-01-01
|
|
853
|
-
created_by:
|
|
853
|
+
created_by: dogesec
|
|
854
854
|
version: 1.0.0
|
|
855
855
|
prompt_base: 'Extract all references to a MITRE CAPEC object from the text.'
|
|
856
856
|
prompt_helper: 'If you are unsure, you can learn more about MITRE CAPEC here: https://capec.mitre.org/'
|
|
@@ -868,7 +868,7 @@ ai_mitre_cwe:
|
|
|
868
868
|
notes: 'lookup_mitre_cwe_id and lookup_mitre_cwe_name legacy extractions also exists if you cannot use AI'
|
|
869
869
|
created: 2020-01-01
|
|
870
870
|
modified: 2020-01-01
|
|
871
|
-
created_by:
|
|
871
|
+
created_by: dogesec
|
|
872
872
|
version: 1.0.0
|
|
873
873
|
prompt_base: 'Extract all references to a MITRE CWE object from the text.'
|
|
874
874
|
prompt_helper: 'If you are unsure, you can learn more about MITRE CAPEC here: https://cwe.mitre.org/'
|
|
@@ -886,7 +886,7 @@ ai_attack_pattern:
|
|
|
886
886
|
notes: 'lookup_attack_pattern legacy extraction also exists if you cannot use AI'
|
|
887
887
|
created: 2020-01-01
|
|
888
888
|
modified: 2020-01-01
|
|
889
|
-
created_by:
|
|
889
|
+
created_by: dogesec
|
|
890
890
|
version: 1.0.0
|
|
891
891
|
prompt_base: 'Extract all Attack Patterns from the text.'
|
|
892
892
|
prompt_helper: 'Attack Patterns are a type of TTP that describe ways that adversaries attempt to compromise targets. Attack Patterns are used to help categorize attacks, generalize specific attacks to the patterns that they follow, and provide detailed information about how attacks are performed. An example of an attack pattern is "spear phishing": a common type of attack where an attacker sends a carefully crafted e-mail message to a party with the intent of getting them to click a link or open an attachment to deliver malware.'
|
|
@@ -902,7 +902,7 @@ ai_campaign:
|
|
|
902
902
|
notes: 'lookup_campaign legacy extraction also exists if you cannot use AI'
|
|
903
903
|
created: 2020-01-01
|
|
904
904
|
modified: 2020-01-01
|
|
905
|
-
created_by:
|
|
905
|
+
created_by: dogesec
|
|
906
906
|
version: 1.0.0
|
|
907
907
|
prompt_base: 'Extract all Campaigns from the text.'
|
|
908
908
|
prompt_helper: 'A Campaign is a grouping of adversarial behaviors that describes a set of malicious activities or attacks (sometimes called waves) that occur over a period of time against a specific set of targets. Campaigns usually have well defined objectives and may be part of an Intrusion Set. Campaigns are often attributed to an intrusion set and threat actors.'
|
|
@@ -918,7 +918,7 @@ ai_course_of_action:
|
|
|
918
918
|
notes: 'lookup_course_of_action legacy extraction also exists if you cannot use AI'
|
|
919
919
|
created: 2020-01-01
|
|
920
920
|
modified: 2020-01-01
|
|
921
|
-
created_by:
|
|
921
|
+
created_by: dogesec
|
|
922
922
|
version: 1.0.0
|
|
923
923
|
prompt_base: 'Extract all Course of Actions from the text.'
|
|
924
924
|
prompt_helper: 'A Course of Action (CoA) is a recommendation from a producer of intelligence to a consumer on the actions that they might take in response to that intelligence. The CoA may be preventative to deter exploitation or corrective to counter its potential impact. The CoA may describe automatable actions (applying patches, configuring firewalls, etc.), manual processes, or a combination of the two. For example, a CoA that describes how to remediate a vulnerability could describe how to apply the patch that removes that vulnerability.'
|
|
@@ -934,7 +934,7 @@ ai_identity:
|
|
|
934
934
|
notes: 'lookup_identity legacy extraction also exists if you cannot use AI'
|
|
935
935
|
created: 2020-01-01
|
|
936
936
|
modified: 2020-01-01
|
|
937
|
-
created_by:
|
|
937
|
+
created_by: dogesec
|
|
938
938
|
version: 1.0.0
|
|
939
939
|
prompt_base: 'Extract all Identities from the text.'
|
|
940
940
|
prompt_helper: 'Identities can represent actual individuals, organizations, or groups (e.g., ACME, Inc.) as well as classes of individuals, organizations, systems or groups (e.g., the finance sector).'
|
|
@@ -950,7 +950,7 @@ ai_infrastructure:
|
|
|
950
950
|
notes: 'lookup_infrastructure legacy extraction also exists if you cannot use AI'
|
|
951
951
|
created: 2020-01-01
|
|
952
952
|
modified: 2020-01-01
|
|
953
|
-
created_by:
|
|
953
|
+
created_by: dogesec
|
|
954
954
|
version: 1.0.0
|
|
955
955
|
prompt_base: 'Extract all Infrastructure from the text.'
|
|
956
956
|
prompt_helper: 'The Infrastructure SDO represents a type of TTP and describes any systems, software services and any associated physical or virtual resources intended to support some purpose (e.g., C2 servers used as part of an attack, device or server that are part of defence, database servers targeted by an attack, etc.).'
|
|
@@ -966,7 +966,7 @@ ai_intrusion_set:
|
|
|
966
966
|
notes: 'lookup_intrusion_set legacy extraction also exists if you cannot use AI'
|
|
967
967
|
created: 2020-01-01
|
|
968
968
|
modified: 2020-01-01
|
|
969
|
-
created_by:
|
|
969
|
+
created_by: dogesec
|
|
970
970
|
version: 1.0.0
|
|
971
971
|
prompt_base: 'Extract all Intrusion Sets from the text.'
|
|
972
972
|
prompt_helper: 'An Intrusion Set is a grouped set of adversarial behaviors and resources with common properties that is believed to be orchestrated by a single organization. An Intrusion Set may capture multiple Campaigns or other activities that are all tied together by shared attributes indicating a common known or unknown Threat Actor.'
|
|
@@ -982,7 +982,7 @@ ai_malware:
|
|
|
982
982
|
notes: 'lookup_malware legacy extraction also exists if you cannot use AI'
|
|
983
983
|
created: 2020-01-01
|
|
984
984
|
modified: 2020-01-01
|
|
985
|
-
created_by:
|
|
985
|
+
created_by: dogesec
|
|
986
986
|
version: 1.0.0
|
|
987
987
|
prompt_base: 'Extract all Malware names from the text.'
|
|
988
988
|
prompt_helper: 'Malware is a type of TTP that represents malicious code. It generally refers to a program that is inserted into a system, usually covertly. The intent is to compromise the confidentiality, integrity, or availability of the victims data, applications, or operating system (OS) or otherwise annoy or disrupt the victim.'
|
|
@@ -998,7 +998,7 @@ ai_threat_actor:
|
|
|
998
998
|
notes: 'lookup_threat_actor legacy extraction also exists if you cannot use AI'
|
|
999
999
|
created: 2020-01-01
|
|
1000
1000
|
modified: 2020-01-01
|
|
1001
|
-
created_by:
|
|
1001
|
+
created_by: dogesec
|
|
1002
1002
|
version: 1.0.0
|
|
1003
1003
|
prompt_base: 'Extract all Threat Actor names from the text.'
|
|
1004
1004
|
prompt_helper: 'Threat Actors are actual individuals, groups, or organizations believed to be operating with malicious intent. A Threat Actor is not an Intrusion Set but may support or be affiliated with various Intrusion Sets, groups, or organizations over time. Threat Actors can be characterized by their motives, capabilities, goals, sophistication level, past activities, resources they have access to, and their role in the organization.'
|
|
@@ -1014,7 +1014,7 @@ ai_tool:
|
|
|
1014
1014
|
notes: 'lookup_tool legacy extraction also exists if you cannot use AI'
|
|
1015
1015
|
created: 2020-01-01
|
|
1016
1016
|
modified: 2020-01-01
|
|
1017
|
-
created_by:
|
|
1017
|
+
created_by: dogesec
|
|
1018
1018
|
version: 1.0.0
|
|
1019
1019
|
prompt_base: 'Extract all Software names from the text.'
|
|
1020
1020
|
prompt_helper: 'Legitimate software that can be used by threat actors to perform attacks. Unlike malware, these software packages are often found on a system and have legitimate purposes for power users, system administrators, network administrators, or even normal users. Remote access tools (e.g., RDP) and network scanning tools (e.g., Nmap) are examples of software that may be used by a Threat Actor during an attack.'
|
|
@@ -11,7 +11,7 @@ lookup_country_alpha2:
|
|
|
11
11
|
file: 'lookups/country_iso3166_alpha2.txt'
|
|
12
12
|
created: 2020-01-01
|
|
13
13
|
modified: 2020-01-01
|
|
14
|
-
created_by:
|
|
14
|
+
created_by: dogesec
|
|
15
15
|
version: 1.0.0
|
|
16
16
|
test_cases: generic_country_alpha2
|
|
17
17
|
stix_mapping: ctibutler-location
|
|
@@ -27,7 +27,7 @@ lookup_mitre_attack_enterprise_id:
|
|
|
27
27
|
file: 'lookups/mitre_attack_enterprise_id_v16_0.txt'
|
|
28
28
|
created: 2020-01-01
|
|
29
29
|
modified: 2020-01-01
|
|
30
|
-
created_by:
|
|
30
|
+
created_by: dogesec
|
|
31
31
|
version: 1.0.0
|
|
32
32
|
test_cases: generic_mitre_attack_enterprise
|
|
33
33
|
stix_mapping: ctibutler-mitre-attack-enterprise-id
|
|
@@ -41,7 +41,7 @@ lookup_mitre_attack_enterprise_name:
|
|
|
41
41
|
file: 'lookups/mitre_attack_enterprise_name_v16_0.txt'
|
|
42
42
|
created: 2020-01-01
|
|
43
43
|
modified: 2020-01-01
|
|
44
|
-
created_by:
|
|
44
|
+
created_by: dogesec
|
|
45
45
|
version: 1.0.0
|
|
46
46
|
test_cases: generic_mitre_attack_enterprise_name
|
|
47
47
|
stix_mapping: ctibutler-mitre-attack-enterprise-name
|
|
@@ -55,7 +55,7 @@ lookup_mitre_attack_enterprise_alias:
|
|
|
55
55
|
file: 'lookups/mitre_attack_enterprise_aliases_v16_0.txt'
|
|
56
56
|
created: 2020-01-01
|
|
57
57
|
modified: 2020-01-01
|
|
58
|
-
created_by:
|
|
58
|
+
created_by: dogesec
|
|
59
59
|
version: 1.0.0
|
|
60
60
|
test_cases: generic_mitre_attack_enterprise_aliases
|
|
61
61
|
stix_mapping: ctibutler-mitre-attack-enterprise-aliases
|
|
@@ -69,7 +69,7 @@ lookup_mitre_attack_mobile_id:
|
|
|
69
69
|
file: 'lookups/mitre_attack_mobile_id_v16_0.txt'
|
|
70
70
|
created: 2020-01-01
|
|
71
71
|
modified: 2020-01-01
|
|
72
|
-
created_by:
|
|
72
|
+
created_by: dogesec
|
|
73
73
|
version: 1.0.0
|
|
74
74
|
test_cases: generic_mitre_attack_mobile
|
|
75
75
|
stix_mapping: ctibutler-mitre-attack-mobile-id
|
|
@@ -83,7 +83,7 @@ lookup_mitre_attack_mobile_name:
|
|
|
83
83
|
file: 'lookups/mitre_attack_mobile_name_v16_0.txt'
|
|
84
84
|
created: 2020-01-01
|
|
85
85
|
modified: 2020-01-01
|
|
86
|
-
created_by:
|
|
86
|
+
created_by: dogesec
|
|
87
87
|
version: 1.0.0
|
|
88
88
|
test_cases: generic_mitre_attack_mobile_name
|
|
89
89
|
stix_mapping: ctibutler-mitre-attack-mobile-name
|
|
@@ -97,7 +97,7 @@ lookup_mitre_attack_mobile_alias:
|
|
|
97
97
|
file: 'lookups/mitre_attack_mobile_aliases_v16_0.txt'
|
|
98
98
|
created: 2020-01-01
|
|
99
99
|
modified: 2020-01-01
|
|
100
|
-
created_by:
|
|
100
|
+
created_by: dogesec
|
|
101
101
|
version: 1.0.0
|
|
102
102
|
test_cases: generic_mitre_attack_mobile_aliases
|
|
103
103
|
stix_mapping: ctibutler-mitre-attack-mobile-aliases
|
|
@@ -111,7 +111,7 @@ lookup_mitre_attack_ics_id:
|
|
|
111
111
|
file: 'lookups/mitre_attack_ics_id_v16_0.txt'
|
|
112
112
|
created: 2020-01-01
|
|
113
113
|
modified: 2020-01-01
|
|
114
|
-
created_by:
|
|
114
|
+
created_by: dogesec
|
|
115
115
|
version: 1.0.0
|
|
116
116
|
test_cases: generic_mitre_attack_ics
|
|
117
117
|
stix_mapping: ctibutler-mitre-attack-ics-id
|
|
@@ -125,7 +125,7 @@ lookup_mitre_attack_ics_name:
|
|
|
125
125
|
file: 'lookups/mitre_attack_ics_name_v16_0.txt'
|
|
126
126
|
created: 2020-01-01
|
|
127
127
|
modified: 2020-01-01
|
|
128
|
-
created_by:
|
|
128
|
+
created_by: dogesec
|
|
129
129
|
version: 1.0.0
|
|
130
130
|
test_cases: generic_mitre_attack_ics_name
|
|
131
131
|
stix_mapping: ctibutler-mitre-attack-ics-name
|
|
@@ -139,7 +139,7 @@ lookup_mitre_attack_ics_alias:
|
|
|
139
139
|
file: 'lookups/mitre_attack_ics_aliases_v16_0.txt'
|
|
140
140
|
created: 2020-01-01
|
|
141
141
|
modified: 2020-01-01
|
|
142
|
-
created_by:
|
|
142
|
+
created_by: dogesec
|
|
143
143
|
version: 1.0.0
|
|
144
144
|
test_cases: generic_mitre_attack_ics_aliases
|
|
145
145
|
stix_mapping: ctibutler-mitre-attack-ics-aliases
|
|
@@ -155,7 +155,7 @@ lookup_mitre_capec_id:
|
|
|
155
155
|
file: 'lookups/mitre_capec_id_v3_9.txt'
|
|
156
156
|
created: 2020-01-01
|
|
157
157
|
modified: 2020-01-01
|
|
158
|
-
created_by:
|
|
158
|
+
created_by: dogesec
|
|
159
159
|
version: 1.0.0
|
|
160
160
|
test_cases: generic_mitre_capec
|
|
161
161
|
stix_mapping: ctibutler-mitre-capec-id
|
|
@@ -169,7 +169,7 @@ lookup_mitre_capec_name:
|
|
|
169
169
|
file: 'lookups/mitre_capec_name_v3_9.txt'
|
|
170
170
|
created: 2020-01-01
|
|
171
171
|
modified: 2020-01-01
|
|
172
|
-
created_by:
|
|
172
|
+
created_by: dogesec
|
|
173
173
|
version: 1.0.0
|
|
174
174
|
test_cases: generic_mitre_capec_name
|
|
175
175
|
stix_mapping: ctibutler-mitre-capec-name
|
|
@@ -185,7 +185,7 @@ lookup_mitre_cwe_id:
|
|
|
185
185
|
file: 'lookups/mitre_cwe_id_v4_15.txt'
|
|
186
186
|
created: 2020-01-01
|
|
187
187
|
modified: 2020-01-01
|
|
188
|
-
created_by:
|
|
188
|
+
created_by: dogesec
|
|
189
189
|
version: 1.0.0
|
|
190
190
|
test_cases: generic_mitre_cwe
|
|
191
191
|
stix_mapping: ctibutler-mitre-cwe-id
|
|
@@ -199,7 +199,7 @@ lookup_mitre_cwe_name:
|
|
|
199
199
|
file: 'lookups/mitre_cwe_name_v4_15.txt'
|
|
200
200
|
created: 2020-01-01
|
|
201
201
|
modified: 2020-01-01
|
|
202
|
-
created_by:
|
|
202
|
+
created_by: dogesec
|
|
203
203
|
version: 1.0.0
|
|
204
204
|
test_cases: generic_mitre_cwe_name
|
|
205
205
|
stix_mapping: ctibutler-mitre-cwe-name
|
|
@@ -215,7 +215,7 @@ lookup_mitre_atlas_id:
|
|
|
215
215
|
file: 'lookups/mitre_atlas_id_v4_5_2.txt'
|
|
216
216
|
created: 2020-01-01
|
|
217
217
|
modified: 2020-01-01
|
|
218
|
-
created_by:
|
|
218
|
+
created_by: dogesec
|
|
219
219
|
version: 1.0.0
|
|
220
220
|
test_cases: generic_mitre_atlas
|
|
221
221
|
stix_mapping: ctibutler-mitre-atlas-id
|
|
@@ -229,7 +229,7 @@ lookup_mitre_atlas_name:
|
|
|
229
229
|
file: 'lookups/mitre_atlas_name_v4_5_2.txt'
|
|
230
230
|
created: 2020-01-01
|
|
231
231
|
modified: 2020-01-01
|
|
232
|
-
created_by:
|
|
232
|
+
created_by: dogesec
|
|
233
233
|
version: 1.0.0
|
|
234
234
|
test_cases: generic_mitre_atlas_name
|
|
235
235
|
stix_mapping: ctibutler-mitre-atlas-name
|
|
@@ -239,13 +239,13 @@ lookup_mitre_atlas_name:
|
|
|
239
239
|
lookup_disarm_id:
|
|
240
240
|
type: lookup
|
|
241
241
|
dogesec_web: false
|
|
242
|
-
name: DISARM
|
|
242
|
+
name: DISARM names
|
|
243
243
|
description: 'Extracts DISARM IDs from text. See lookup name for version used.'
|
|
244
244
|
notes: 'No corresponding AI version yet due to poor AI performance'
|
|
245
245
|
file: 'lookups/disarm_id_v1_5.txt'
|
|
246
246
|
created: 2020-01-01
|
|
247
247
|
modified: 2020-01-01
|
|
248
|
-
created_by:
|
|
248
|
+
created_by: dogesec
|
|
249
249
|
version: 1.0.0
|
|
250
250
|
test_cases: generic_disarm
|
|
251
251
|
stix_mapping: ctibutler-disarm-id
|
|
@@ -259,7 +259,7 @@ lookup_disarm_name:
|
|
|
259
259
|
file: 'lookups/disarm_name_v1_5.txt'
|
|
260
260
|
created: 2020-01-01
|
|
261
261
|
modified: 2020-01-01
|
|
262
|
-
created_by:
|
|
262
|
+
created_by: dogesec
|
|
263
263
|
version: 1.0.0
|
|
264
264
|
test_cases: generic_disarm_name
|
|
265
265
|
stix_mapping: ctibutler-disarm-name
|
|
@@ -275,7 +275,7 @@ lookup_attack_pattern:
|
|
|
275
275
|
file: 'lookups/attack_pattern.txt'
|
|
276
276
|
created: 2020-01-01
|
|
277
277
|
modified: 2020-01-01
|
|
278
|
-
created_by:
|
|
278
|
+
created_by: dogesec
|
|
279
279
|
version: 1.0.0
|
|
280
280
|
test_cases: lookup_attack_pattern
|
|
281
281
|
stix_mapping: attack-pattern
|
|
@@ -289,7 +289,7 @@ lookup_campaign:
|
|
|
289
289
|
file: 'lookups/campaign.txt'
|
|
290
290
|
created: 2020-01-01
|
|
291
291
|
modified: 2020-01-01
|
|
292
|
-
created_by:
|
|
292
|
+
created_by: dogesec
|
|
293
293
|
version: 1.0.0
|
|
294
294
|
test_cases: lookup_campaign
|
|
295
295
|
stix_mapping: campaign
|
|
@@ -303,7 +303,7 @@ lookup_course_of_action:
|
|
|
303
303
|
file: 'lookups/course_of_action.txt'
|
|
304
304
|
created: 2020-01-01
|
|
305
305
|
modified: 2020-01-01
|
|
306
|
-
created_by:
|
|
306
|
+
created_by: dogesec
|
|
307
307
|
version: 1.0.0
|
|
308
308
|
test_cases: lookup_course_of_action
|
|
309
309
|
stix_mapping: course-of-action
|
|
@@ -317,7 +317,7 @@ lookup_identity:
|
|
|
317
317
|
file: 'lookups/identity.txt'
|
|
318
318
|
created: 2020-01-01
|
|
319
319
|
modified: 2020-01-01
|
|
320
|
-
created_by:
|
|
320
|
+
created_by: dogesec
|
|
321
321
|
version: 1.0.0
|
|
322
322
|
test_cases: lookup_identity
|
|
323
323
|
stix_mapping: identity
|
|
@@ -331,7 +331,7 @@ lookup_infrastructure:
|
|
|
331
331
|
file: 'lookups/infrastructure.txt'
|
|
332
332
|
created: 2020-01-01
|
|
333
333
|
modified: 2020-01-01
|
|
334
|
-
created_by:
|
|
334
|
+
created_by: dogesec
|
|
335
335
|
version: 1.0.0
|
|
336
336
|
test_cases: lookup_infrastructure
|
|
337
337
|
stix_mapping: infrastructure
|
|
@@ -345,7 +345,7 @@ lookup_intrusion_set:
|
|
|
345
345
|
file: 'lookups/intrusion_set.txt'
|
|
346
346
|
created: 2020-01-01
|
|
347
347
|
modified: 2020-01-01
|
|
348
|
-
created_by:
|
|
348
|
+
created_by: dogesec
|
|
349
349
|
version: 1.0.0
|
|
350
350
|
test_cases: lookup_intrusion_set
|
|
351
351
|
stix_mapping: intrusion-set
|
|
@@ -359,7 +359,7 @@ lookup_malware:
|
|
|
359
359
|
file: 'lookups/malware.txt'
|
|
360
360
|
created: 2020-01-01
|
|
361
361
|
modified: 2020-01-01
|
|
362
|
-
created_by:
|
|
362
|
+
created_by: dogesec
|
|
363
363
|
version: 1.0.0
|
|
364
364
|
test_cases: lookup_malware
|
|
365
365
|
stix_mapping: malware
|
|
@@ -373,7 +373,7 @@ lookup_threat_actor:
|
|
|
373
373
|
file: 'lookups/threat_actor.txt'
|
|
374
374
|
created: 2020-01-01
|
|
375
375
|
modified: 2020-01-01
|
|
376
|
-
created_by:
|
|
376
|
+
created_by: dogesec
|
|
377
377
|
version: 1.0.0
|
|
378
378
|
test_cases: lookup_threat_actor
|
|
379
379
|
stix_mapping: threat-actor
|
|
@@ -387,7 +387,7 @@ lookup_tool:
|
|
|
387
387
|
file: 'lookups/tool.txt'
|
|
388
388
|
created: 2020-01-01
|
|
389
389
|
modified: 2020-01-01
|
|
390
|
-
created_by:
|
|
390
|
+
created_by: dogesec
|
|
391
391
|
version: 1.0.0
|
|
392
392
|
test_cases: lookup_tool
|
|
393
|
-
stix_mapping: tool
|
|
393
|
+
stix_mapping: tool
|
|
@@ -10,7 +10,7 @@ pattern_ipv4_address_only:
|
|
|
10
10
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_ipv4_address_only'
|
|
11
11
|
created: 2020-01-01
|
|
12
12
|
modified: 2020-01-01
|
|
13
|
-
created_by:
|
|
13
|
+
created_by: dogesec
|
|
14
14
|
version: 1.0.0
|
|
15
15
|
test_cases: generic_ipv4_address_only
|
|
16
16
|
stix_mapping: ipv4-addr
|
|
@@ -23,7 +23,7 @@ pattern_ipv4_address_cidr:
|
|
|
23
23
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_ipv4_address_cidr'
|
|
24
24
|
created: 2020-01-01
|
|
25
25
|
modified: 2020-01-01
|
|
26
|
-
created_by:
|
|
26
|
+
created_by: dogesec
|
|
27
27
|
version: 1.0.0
|
|
28
28
|
test_cases: ipv4_address_cidr
|
|
29
29
|
stix_mapping: ipv4-addr
|
|
@@ -36,7 +36,7 @@ pattern_ipv4_address_port:
|
|
|
36
36
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_ipv4_address_port'
|
|
37
37
|
created: 2020-01-01
|
|
38
38
|
modified: 2020-01-01
|
|
39
|
-
created_by:
|
|
39
|
+
created_by: dogesec
|
|
40
40
|
version: 1.0.0
|
|
41
41
|
test_cases: ipv4_address_port
|
|
42
42
|
stix_mapping: ipv4-addr-port
|
|
@@ -51,7 +51,7 @@ pattern_ipv6_address_only:
|
|
|
51
51
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_ipv6_address_only'
|
|
52
52
|
created: 2020-01-01
|
|
53
53
|
modified: 2020-01-01
|
|
54
|
-
created_by:
|
|
54
|
+
created_by: dogesec
|
|
55
55
|
version: 1.0.0
|
|
56
56
|
test_cases: generic_ipv6_address_only
|
|
57
57
|
stix_mapping: ipv6-addr
|
|
@@ -64,7 +64,7 @@ pattern_ipv6_address_cidr:
|
|
|
64
64
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_ipv6_address_cidr'
|
|
65
65
|
created: 2020-01-01
|
|
66
66
|
modified: 2020-01-01
|
|
67
|
-
created_by:
|
|
67
|
+
created_by: dogesec
|
|
68
68
|
version: 1.0.0
|
|
69
69
|
test_cases: generic_ipv6_address_cidr
|
|
70
70
|
stix_mapping: ipv6-addr
|
|
@@ -77,7 +77,7 @@ pattern_ipv6_address_port:
|
|
|
77
77
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_ipv6_address_port'
|
|
78
78
|
created: 2020-01-01
|
|
79
79
|
modified: 2020-01-01
|
|
80
|
-
created_by:
|
|
80
|
+
created_by: dogesec
|
|
81
81
|
version: 1.0.0
|
|
82
82
|
test_cases: generic_ipv6_address_port
|
|
83
83
|
stix_mapping: ipv6-addr-port
|
|
@@ -92,7 +92,7 @@ pattern_domain_name_only:
|
|
|
92
92
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_domain_name_only'
|
|
93
93
|
created: 2020-01-01
|
|
94
94
|
modified: 2020-01-01
|
|
95
|
-
created_by:
|
|
95
|
+
created_by: dogesec
|
|
96
96
|
version: 1.0.0
|
|
97
97
|
test_cases: generic_domain_name_only
|
|
98
98
|
stix_mapping: domain-name
|
|
@@ -105,7 +105,7 @@ pattern_domain_name_subdomain:
|
|
|
105
105
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_domain_name_subdomain'
|
|
106
106
|
created: 2020-01-01
|
|
107
107
|
modified: 2020-01-01
|
|
108
|
-
created_by:
|
|
108
|
+
created_by: dogesec
|
|
109
109
|
version: 1.0.0
|
|
110
110
|
test_cases: generic_domain_name_subdomain
|
|
111
111
|
stix_mapping: domain-name
|
|
@@ -120,7 +120,7 @@ pattern_url:
|
|
|
120
120
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_pattern_url'
|
|
121
121
|
created: 2020-01-01
|
|
122
122
|
modified: 2020-01-01
|
|
123
|
-
created_by:
|
|
123
|
+
created_by: dogesec
|
|
124
124
|
version: 1.0.0
|
|
125
125
|
test_cases: generic_url
|
|
126
126
|
stix_mapping: url
|
|
@@ -133,7 +133,7 @@ pattern_url_file:
|
|
|
133
133
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_url_file'
|
|
134
134
|
created: 2020-01-01
|
|
135
135
|
modified: 2020-01-01
|
|
136
|
-
created_by:
|
|
136
|
+
created_by: dogesec
|
|
137
137
|
version: 1.0.0
|
|
138
138
|
test_cases: generic_url_file
|
|
139
139
|
stix_mapping: url
|
|
@@ -146,7 +146,7 @@ pattern_url_path:
|
|
|
146
146
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_url_path'
|
|
147
147
|
created: 2020-01-01
|
|
148
148
|
modified: 2020-01-01
|
|
149
|
-
created_by:
|
|
149
|
+
created_by: dogesec
|
|
150
150
|
version: 1.0.0
|
|
151
151
|
test_cases: generic_url_path
|
|
152
152
|
stix_mapping: url
|
|
@@ -161,7 +161,7 @@ pattern_host_name:
|
|
|
161
161
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_host_name'
|
|
162
162
|
created: 2020-01-01
|
|
163
163
|
modified: 2020-01-01
|
|
164
|
-
created_by:
|
|
164
|
+
created_by: dogesec
|
|
165
165
|
version: 1.0.0
|
|
166
166
|
test_cases: generic_host_name
|
|
167
167
|
stix_mapping: domain-name
|
|
@@ -174,7 +174,7 @@ pattern_host_name_subdomain:
|
|
|
174
174
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_host_name_subdomain'
|
|
175
175
|
created: 2020-01-01
|
|
176
176
|
modified: 2020-01-01
|
|
177
|
-
created_by:
|
|
177
|
+
created_by: dogesec
|
|
178
178
|
version: 1.0.0
|
|
179
179
|
test_cases: generic_host_name_subdomain
|
|
180
180
|
stix_mapping: domain-name
|
|
@@ -187,7 +187,7 @@ pattern_host_name_url:
|
|
|
187
187
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_host_name_url'
|
|
188
188
|
created: 2020-01-01
|
|
189
189
|
modified: 2020-01-01
|
|
190
|
-
created_by:
|
|
190
|
+
created_by: dogesec
|
|
191
191
|
version: 1.0.0
|
|
192
192
|
test_cases: generic_host_name_url
|
|
193
193
|
stix_mapping: url
|
|
@@ -200,7 +200,7 @@ pattern_host_name_file:
|
|
|
200
200
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_host_name_file'
|
|
201
201
|
created: 2020-01-01
|
|
202
202
|
modified: 2020-01-01
|
|
203
|
-
created_by:
|
|
203
|
+
created_by: dogesec
|
|
204
204
|
version: 1.0.0
|
|
205
205
|
test_cases: generic_host_name_file
|
|
206
206
|
stix_mapping: url
|
|
@@ -213,7 +213,7 @@ pattern_host_name_path:
|
|
|
213
213
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_host_name_path'
|
|
214
214
|
created: 2020-01-01
|
|
215
215
|
modified: 2020-01-01
|
|
216
|
-
created_by:
|
|
216
|
+
created_by: dogesec
|
|
217
217
|
version: 1.0.0
|
|
218
218
|
test_cases: generic_host_name_path
|
|
219
219
|
stix_mapping: url
|
|
@@ -228,7 +228,7 @@ pattern_directory_windows:
|
|
|
228
228
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_directory_windows'
|
|
229
229
|
created: 2020-01-01
|
|
230
230
|
modified: 2020-01-01
|
|
231
|
-
created_by:
|
|
231
|
+
created_by: dogesec
|
|
232
232
|
version: 1.0.0
|
|
233
233
|
test_cases: generic_directory_windows
|
|
234
234
|
stix_mapping: directory
|
|
@@ -241,7 +241,7 @@ pattern_directory_windows_with_file:
|
|
|
241
241
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_directory_windows_with_file'
|
|
242
242
|
created: 2020-01-01
|
|
243
243
|
modified: 2020-01-01
|
|
244
|
-
created_by:
|
|
244
|
+
created_by: dogesec
|
|
245
245
|
version: 1.0.0
|
|
246
246
|
test_cases: generic_directory_windows_with_file
|
|
247
247
|
stix_mapping: directory-file
|
|
@@ -254,7 +254,7 @@ pattern_directory_unix:
|
|
|
254
254
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_directory_unix'
|
|
255
255
|
created: 2020-01-01
|
|
256
256
|
modified: 2020-01-01
|
|
257
|
-
created_by:
|
|
257
|
+
created_by: dogesec
|
|
258
258
|
version: 1.0.0
|
|
259
259
|
test_cases: generic_directory_unix
|
|
260
260
|
stix_mapping: directory
|
|
@@ -267,7 +267,7 @@ pattern_directory_unix_file:
|
|
|
267
267
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_directory_unix_file'
|
|
268
268
|
created: 2020-01-01
|
|
269
269
|
modified: 2020-01-01
|
|
270
|
-
created_by:
|
|
270
|
+
created_by: dogesec
|
|
271
271
|
version: 1.0.0
|
|
272
272
|
test_cases: generic_directory_unix_file
|
|
273
273
|
stix_mapping: directory-file
|
|
@@ -282,7 +282,7 @@ pattern_file_name:
|
|
|
282
282
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_file_name'
|
|
283
283
|
created: 2020-01-01
|
|
284
284
|
modified: 2020-01-01
|
|
285
|
-
created_by:
|
|
285
|
+
created_by: dogesec
|
|
286
286
|
version: 1.0.0
|
|
287
287
|
test_cases: generic_file_name
|
|
288
288
|
stix_mapping: file
|
|
@@ -295,7 +295,7 @@ pattern_file_hash_md5:
|
|
|
295
295
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_file_hash_md5'
|
|
296
296
|
created: 2020-01-01
|
|
297
297
|
modified: 2020-01-01
|
|
298
|
-
created_by:
|
|
298
|
+
created_by: dogesec
|
|
299
299
|
version: 1.0.0
|
|
300
300
|
test_cases: generic_file_hash_md5
|
|
301
301
|
stix_mapping: file-hash
|
|
@@ -308,7 +308,7 @@ pattern_file_hash_sha_1:
|
|
|
308
308
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_file_hash_sha_1'
|
|
309
309
|
created: 2020-01-01
|
|
310
310
|
modified: 2020-01-01
|
|
311
|
-
created_by:
|
|
311
|
+
created_by: dogesec
|
|
312
312
|
version: 1.0.0
|
|
313
313
|
test_cases: generic_file_hash_sha_1
|
|
314
314
|
stix_mapping: file-hash
|
|
@@ -321,7 +321,7 @@ pattern_file_hash_sha_256:
|
|
|
321
321
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_file_hash_sha_256'
|
|
322
322
|
created: 2020-01-01
|
|
323
323
|
modified: 2020-01-01
|
|
324
|
-
created_by:
|
|
324
|
+
created_by: dogesec
|
|
325
325
|
version: 1.0.0
|
|
326
326
|
test_cases: generic_file_hash_sha_256
|
|
327
327
|
stix_mapping: file-hash
|
|
@@ -334,7 +334,7 @@ pattern_file_hash_sha_512:
|
|
|
334
334
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_file_hash_sha_512'
|
|
335
335
|
created: 2020-01-01
|
|
336
336
|
modified: 2020-01-01
|
|
337
|
-
created_by:
|
|
337
|
+
created_by: dogesec
|
|
338
338
|
version: 1.0.0
|
|
339
339
|
test_cases: generic_file_hash_sha_512
|
|
340
340
|
stix_mapping: file-hash
|
|
@@ -349,7 +349,7 @@ pattern_email_address:
|
|
|
349
349
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_email_address'
|
|
350
350
|
created: 2020-01-01
|
|
351
351
|
modified: 2020-01-01
|
|
352
|
-
created_by:
|
|
352
|
+
created_by: dogesec
|
|
353
353
|
version: 1.0.0
|
|
354
354
|
test_cases: generic_email_address
|
|
355
355
|
stix_mapping: email-addr
|
|
@@ -364,7 +364,7 @@ pattern_mac_address:
|
|
|
364
364
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_mac_address'
|
|
365
365
|
created: 2020-01-01
|
|
366
366
|
modified: 2020-01-01
|
|
367
|
-
created_by:
|
|
367
|
+
created_by: dogesec
|
|
368
368
|
version: 1.0.0
|
|
369
369
|
test_cases: generic_mac_address
|
|
370
370
|
stix_mapping: mac-addr
|
|
@@ -379,7 +379,7 @@ pattern_windows_registry_key:
|
|
|
379
379
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_windows_registry_key'
|
|
380
380
|
created: 2020-01-01
|
|
381
381
|
modified: 2020-01-01
|
|
382
|
-
created_by:
|
|
382
|
+
created_by: dogesec
|
|
383
383
|
version: 1.0.0
|
|
384
384
|
test_cases: generic_windows_registry_key
|
|
385
385
|
stix_mapping: windows-registry-key
|
|
@@ -394,7 +394,7 @@ pattern_user_agent:
|
|
|
394
394
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_user_agent'
|
|
395
395
|
created: 2020-01-01
|
|
396
396
|
modified: 2020-01-01
|
|
397
|
-
created_by:
|
|
397
|
+
created_by: dogesec
|
|
398
398
|
version: 1.0.0
|
|
399
399
|
test_cases: generic_user_agent
|
|
400
400
|
stix_mapping: user-agent
|
|
@@ -409,7 +409,7 @@ pattern_autonomous_system_number:
|
|
|
409
409
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_autonomous_system_number'
|
|
410
410
|
created: 2020-01-01
|
|
411
411
|
modified: 2020-01-01
|
|
412
|
-
created_by:
|
|
412
|
+
created_by: dogesec
|
|
413
413
|
version: 1.0.0
|
|
414
414
|
test_cases: generic_autonomous_system_number
|
|
415
415
|
stix_mapping: autonomous-system
|
|
@@ -424,7 +424,7 @@ pattern_cryptocurrency_btc_wallet:
|
|
|
424
424
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_cryptocurrency_btc_wallet'
|
|
425
425
|
created: 2020-01-01
|
|
426
426
|
modified: 2020-01-01
|
|
427
|
-
created_by:
|
|
427
|
+
created_by: dogesec
|
|
428
428
|
version: 1.0.0
|
|
429
429
|
test_cases: generic_cryptocurrency_btc_wallet
|
|
430
430
|
stix_mapping: cryptocurrency-wallet
|
|
@@ -437,7 +437,7 @@ pattern_cryptocurrency_btc_wallet_transaction:
|
|
|
437
437
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_cryptocurrency_btc_wallet_transaction'
|
|
438
438
|
created: 2020-01-01
|
|
439
439
|
modified: 2020-01-01
|
|
440
|
-
created_by:
|
|
440
|
+
created_by: dogesec
|
|
441
441
|
version: 1.0.0
|
|
442
442
|
test_cases: generic_cryptocurrency_btc_wallet
|
|
443
443
|
stix_mapping: cryptocurrency-wallet-with-transaction
|
|
@@ -450,7 +450,7 @@ pattern_cryptocurrency_btc_transaction:
|
|
|
450
450
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_cryptocurrency_btc_transaction'
|
|
451
451
|
created: 2020-01-01
|
|
452
452
|
modified: 2020-01-01
|
|
453
|
-
created_by:
|
|
453
|
+
created_by: dogesec
|
|
454
454
|
version: 1.0.0
|
|
455
455
|
test_cases: generic_cryptocurrency_btc_transaction
|
|
456
456
|
stix_mapping: cryptocurrency-transaction
|
|
@@ -465,7 +465,7 @@ pattern_cve_id:
|
|
|
465
465
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_cve_id'
|
|
466
466
|
created: 2020-01-01
|
|
467
467
|
modified: 2020-01-01
|
|
468
|
-
created_by:
|
|
468
|
+
created_by: dogesec
|
|
469
469
|
version: 1.0.0
|
|
470
470
|
test_cases: generic_cve_id
|
|
471
471
|
stix_mapping: vulmatch-cve-id
|
|
@@ -480,7 +480,7 @@ pattern_cpe_uri:
|
|
|
480
480
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_cpe_uri'
|
|
481
481
|
created: 2020-01-01
|
|
482
482
|
modified: 2020-01-01
|
|
483
|
-
created_by:
|
|
483
|
+
created_by: dogesec
|
|
484
484
|
version: 1.0.0
|
|
485
485
|
test_cases: generic_cpe_uri
|
|
486
486
|
stix_mapping: vulmatch-cpe-id
|
|
@@ -495,7 +495,7 @@ pattern_bank_card_mastercard:
|
|
|
495
495
|
notes: 'Also available: ai_bank_card_mastercard'
|
|
496
496
|
created: 2020-01-01
|
|
497
497
|
modified: 2020-01-01
|
|
498
|
-
created_by:
|
|
498
|
+
created_by: dogesec
|
|
499
499
|
version: 1.0.0
|
|
500
500
|
test_cases: generic_bank_card_mastercard
|
|
501
501
|
stix_mapping: payment-card
|
|
@@ -508,7 +508,7 @@ pattern_bank_card_visa:
|
|
|
508
508
|
notes: 'Also available: ai_bank_card_visa'
|
|
509
509
|
created: 2020-01-01
|
|
510
510
|
modified: 2020-01-01
|
|
511
|
-
created_by:
|
|
511
|
+
created_by: dogesec
|
|
512
512
|
version: 1.0.0
|
|
513
513
|
test_cases: generic_bank_card_visa
|
|
514
514
|
stix_mapping: payment-card
|
|
@@ -521,7 +521,7 @@ pattern_bank_card_amex:
|
|
|
521
521
|
notes: 'Also available: ai_bank_card_amex'
|
|
522
522
|
created: 2020-01-01
|
|
523
523
|
modified: 2020-01-01
|
|
524
|
-
created_by:
|
|
524
|
+
created_by: dogesec
|
|
525
525
|
version: 1.0.0
|
|
526
526
|
test_cases: generic_bank_card_amex
|
|
527
527
|
stix_mapping: payment-card
|
|
@@ -534,7 +534,7 @@ pattern_bank_card_union_pay:
|
|
|
534
534
|
notes: 'Also available: ai_bank_card_union_pay'
|
|
535
535
|
created: 2020-01-01
|
|
536
536
|
modified: 2020-01-01
|
|
537
|
-
created_by:
|
|
537
|
+
created_by: dogesec
|
|
538
538
|
version: 1.0.0
|
|
539
539
|
test_cases: generic_bank_card_union_pay
|
|
540
540
|
stix_mapping: payment-card
|
|
@@ -547,7 +547,7 @@ pattern_bank_card_diners:
|
|
|
547
547
|
notes: 'Also available: ai_bank_card_diners'
|
|
548
548
|
created: 2020-01-01
|
|
549
549
|
modified: 2020-01-01
|
|
550
|
-
created_by:
|
|
550
|
+
created_by: dogesec
|
|
551
551
|
version: 1.0.0
|
|
552
552
|
test_cases: generic_bank_card_diners
|
|
553
553
|
stix_mapping: payment-card
|
|
@@ -560,7 +560,7 @@ pattern_bank_card_jcb:
|
|
|
560
560
|
notes: 'Also available: ai_bank_card_jcb'
|
|
561
561
|
created: 2020-01-01
|
|
562
562
|
modified: 2020-01-01
|
|
563
|
-
created_by:
|
|
563
|
+
created_by: dogesec
|
|
564
564
|
version: 1.0.0
|
|
565
565
|
test_cases: generic_bank_card_jcb
|
|
566
566
|
stix_mapping: payment-card
|
|
@@ -573,7 +573,7 @@ pattern_bank_card_discover:
|
|
|
573
573
|
notes: 'Also available: ai_bank_card_discover'
|
|
574
574
|
created: 2020-01-01
|
|
575
575
|
modified: 2020-01-01
|
|
576
|
-
created_by:
|
|
576
|
+
created_by: dogesec
|
|
577
577
|
version: 1.0.0
|
|
578
578
|
test_cases: generic_bank_card_discover
|
|
579
579
|
stix_mapping: payment-card
|
|
@@ -588,7 +588,7 @@ pattern_iban_number:
|
|
|
588
588
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_iban_number'
|
|
589
589
|
created: 2020-01-01
|
|
590
590
|
modified: 2020-01-01
|
|
591
|
-
created_by:
|
|
591
|
+
created_by: dogesec
|
|
592
592
|
version: 1.0.0
|
|
593
593
|
test_cases: generic_iban_number
|
|
594
594
|
stix_mapping: bank-account
|
|
@@ -603,7 +603,7 @@ pattern_phone_number:
|
|
|
603
603
|
notes: 'RECOMMENDED FOR BETTER ACCURACY: Use ai_phone_number'
|
|
604
604
|
created: 2020-01-01
|
|
605
605
|
modified: 2020-01-01
|
|
606
|
-
created_by:
|
|
606
|
+
created_by: dogesec
|
|
607
607
|
version: 1.0.0
|
|
608
608
|
test_cases: generic_phone_number
|
|
609
609
|
stix_mapping: phone-number
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: txt2stix
|
|
3
|
-
Version: 1.1.
|
|
3
|
+
Version: 1.1.8
|
|
4
4
|
Summary: txt2stix is a Python script that is designed to identify and extract IoCs and TTPs from text files, identify the relationships between them, convert them to STIX 2.1 objects, and output as a STIX 2.1 bundle.
|
|
5
5
|
Project-URL: Homepage, https://github.com/muchdogesec/txt2stix
|
|
6
6
|
Project-URL: Issues, https://github.com/muchdogesec/txt2stix/issues
|
|
@@ -14,6 +14,7 @@ Classifier: Programming Language :: Python :: 3
|
|
|
14
14
|
Requires-Python: >=3.9
|
|
15
15
|
Requires-Dist: base58>=2.1.1
|
|
16
16
|
Requires-Dist: beautifulsoup4>=4.12.3
|
|
17
|
+
Requires-Dist: json-repair
|
|
17
18
|
Requires-Dist: llama-index-core>=0.12.42
|
|
18
19
|
Requires-Dist: llama-index-llms-openai>=0.4.5
|
|
19
20
|
Requires-Dist: mistune>=3.0.2
|
|
@@ -18,7 +18,7 @@ txt2stix/ai_extractor/gemini.py,sha256=yJC7knYzl-TScyCBd-MTpUf-NT6znC25E7vXxNMqj
|
|
|
18
18
|
txt2stix/ai_extractor/openai.py,sha256=1RxaLy0TJ4GjNKmcJoi6ZiBrCS_gt5ql9jpeE-SOy8g,642
|
|
19
19
|
txt2stix/ai_extractor/openrouter.py,sha256=hAA6mTOMcpA28XYsOCvuJH7WMJqXCxfqZGJf_VrDsIk,628
|
|
20
20
|
txt2stix/ai_extractor/prompts.py,sha256=NtqtVyPPtShPlVZ5SrFmo-LCkfpANIIi4H9rjqaxqDo,10559
|
|
21
|
-
txt2stix/ai_extractor/utils.py,sha256=
|
|
21
|
+
txt2stix/ai_extractor/utils.py,sha256=K3qglBRWYAuRU806-ahbz_PK1qQFfJ7ueWybVxYZYlQ,4425
|
|
22
22
|
txt2stix/pattern/__init__.py,sha256=K9ofaP2AOikvzb48VSBpJZijckdqufZxSzr_kbRypLY,491
|
|
23
23
|
txt2stix/pattern/extractors/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
24
24
|
txt2stix/pattern/extractors/base_extractor.py,sha256=ly80rp-L40g7DbhrGiCvhPWI95-ZFMtAQUEC-fH6Y-o,6130
|
|
@@ -74,9 +74,9 @@ txt2stix/pattern/extractors/url/url_extractor.py,sha256=-SH1WvxbViaRZ1on8lRlzNAc
|
|
|
74
74
|
txt2stix/pattern/extractors/url/url_file_extractor.py,sha256=_VDu_BX3Ys9SKhZlscZPp9xSOKCxNKKvJ2gbe7Nvuv0,881
|
|
75
75
|
txt2stix/pattern/extractors/url/url_path_extractor.py,sha256=FNKcMZRnJpcZZF44T8DHsDWzhBqPq5a23h7T7l2osac,2459
|
|
76
76
|
txt2stix/includes/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
77
|
-
txt2stix/includes/extractions/ai/config.yaml,sha256=
|
|
78
|
-
txt2stix/includes/extractions/lookup/config.yaml,sha256=
|
|
79
|
-
txt2stix/includes/extractions/pattern/config.yaml,sha256=
|
|
77
|
+
txt2stix/includes/extractions/ai/config.yaml,sha256=0-jgrxsEEIZBs274WI4Trz3vgk6BW2hzV3p0jGnoKmA,41564
|
|
78
|
+
txt2stix/includes/extractions/lookup/config.yaml,sha256=iT0lHHlMdx719qA2tyI_zsWqk9SUS6jmZtBY9_H-i4A,12062
|
|
79
|
+
txt2stix/includes/extractions/pattern/config.yaml,sha256=92buge3fYegXIN1TSjLKq4PdIbKAGvDAc4CoQpR38sA,20196
|
|
80
80
|
txt2stix/includes/helpers/mimetype_filename_extension_list.csv,sha256=kgozjMyp7y87CqRcoedfDwNXSLKrDgC9r9YKDYK0EbY,27593
|
|
81
81
|
txt2stix/includes/helpers/stix_relationship_types.txt,sha256=PQytANVSrWepdK_SLEZtfiTe1eoxj6YMGUZslO_C1oc,505
|
|
82
82
|
txt2stix/includes/helpers/tlds.txt,sha256=Va_awj-FQiKgs5ace6C0kC5xxAHIl9yAIBhvT08Q7Q0,9551
|
|
@@ -113,8 +113,8 @@ txt2stix/includes/lookups/threat_actor.txt,sha256=QfDO9maQuqKBgW_Sdd7VGv1SHZ9Ra-
|
|
|
113
113
|
txt2stix/includes/lookups/tld.txt,sha256=-MEgJea2NMG_KDsnc4BVvI8eRk5Dm93L-t8SGYx5wMo,8598
|
|
114
114
|
txt2stix/includes/lookups/tool.txt,sha256=HGKG6JpUE26w6ezzSxOjBkp15UpSaB7N-mZ_NU_3G7A,6
|
|
115
115
|
txt2stix/includes/tests/test_cases.yaml,sha256=QD1FdIunpPkOpsn6wJRqs2vil_hv8OSVaqUp4a96aZg,22247
|
|
116
|
-
txt2stix-1.1.
|
|
117
|
-
txt2stix-1.1.
|
|
118
|
-
txt2stix-1.1.
|
|
119
|
-
txt2stix-1.1.
|
|
120
|
-
txt2stix-1.1.
|
|
116
|
+
txt2stix-1.1.8.dist-info/METADATA,sha256=1DiACAC7Br7D4JcHa_sGzSWoATiUvIbq0iEm4dvdh0M,15360
|
|
117
|
+
txt2stix-1.1.8.dist-info/WHEEL,sha256=qtCwoSJWgHk21S1Kb4ihdzI2rlJ1ZKaIurTj_ngOhyQ,87
|
|
118
|
+
txt2stix-1.1.8.dist-info/entry_points.txt,sha256=x6QPtt65hWeomw4IpJ_wQUesBl1M4WOLODbhOKyWMFg,55
|
|
119
|
+
txt2stix-1.1.8.dist-info/licenses/LICENSE,sha256=BK8Ppqlc4pdgnNzIxnxde0taoQ1BgicdyqmBvMiNYgY,11364
|
|
120
|
+
txt2stix-1.1.8.dist-info/RECORD,,
|
|
File without changes
|
|
File without changes
|
|
File without changes
|