txt2stix 1.1.7__py3-none-any.whl → 1.1.9__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (34) hide show
  1. txt2stix/ai_extractor/utils.py +4 -1
  2. txt2stix/includes/extractions/ai/config.yaml +20 -0
  3. txt2stix/includes/extractions/lookup/config.yaml +33 -15
  4. txt2stix/includes/lookups/_generate_lookups.py +39 -30
  5. txt2stix/includes/lookups/{disarm_id_v1_5.txt → disarm_id_v1_6.txt} +95 -32
  6. txt2stix/includes/lookups/{disarm_name_v1_5.txt → disarm_name_v1_6.txt} +380 -317
  7. txt2stix/includes/lookups/{mitre_atlas_id_v4_5_2.txt → mitre_atlas_id_v4_9_0.txt} +41 -1
  8. txt2stix/includes/lookups/mitre_atlas_name_v4_9_0.txt +157 -0
  9. txt2stix/includes/lookups/{mitre_attack_enterprise_aliases_v16_0.txt → mitre_attack_enterprise_aliases_v18_0.txt} +679 -531
  10. txt2stix/includes/lookups/mitre_attack_enterprise_id_v18_0.txt +4293 -0
  11. txt2stix/includes/lookups/mitre_attack_enterprise_name_v18_0.txt +4295 -0
  12. txt2stix/includes/lookups/{mitre_attack_ics_aliases_v16_0.txt → mitre_attack_ics_aliases_v18_0.txt} +7 -3
  13. txt2stix/includes/lookups/mitre_attack_ics_id_v18_0.txt +410 -0
  14. txt2stix/includes/lookups/{mitre_attack_ics_name_v16_0.txt → mitre_attack_ics_name_v18_0.txt} +172 -53
  15. txt2stix/includes/lookups/{mitre_attack_mobile_aliases_v16_0.txt → mitre_attack_mobile_aliases_v18_0.txt} +33 -0
  16. txt2stix/includes/lookups/mitre_attack_mobile_id_v18_0.txt +643 -0
  17. txt2stix/includes/lookups/mitre_attack_mobile_name_v18_0.txt +645 -0
  18. txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +522 -522
  19. txt2stix/includes/lookups/{mitre_cwe_id_v4_15.txt → mitre_cwe_id_v4_18.txt} +5 -0
  20. txt2stix/includes/lookups/{mitre_cwe_name_v4_15.txt → mitre_cwe_name_v4_18.txt} +889 -884
  21. txt2stix/includes/lookups/sector_aliases_v1_0.txt +751 -0
  22. txt2stix/includes/tests/test_cases.yaml +8 -0
  23. txt2stix/retriever.py +6 -0
  24. {txt2stix-1.1.7.dist-info → txt2stix-1.1.9.dist-info}/METADATA +2 -1
  25. {txt2stix-1.1.7.dist-info → txt2stix-1.1.9.dist-info}/RECORD +28 -27
  26. txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +0 -117
  27. txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +0 -1656
  28. txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +0 -1765
  29. txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +0 -254
  30. txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +0 -277
  31. txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +0 -296
  32. {txt2stix-1.1.7.dist-info → txt2stix-1.1.9.dist-info}/WHEEL +0 -0
  33. {txt2stix-1.1.7.dist-info → txt2stix-1.1.9.dist-info}/entry_points.txt +0 -0
  34. {txt2stix-1.1.7.dist-info → txt2stix-1.1.9.dist-info}/licenses/LICENSE +0 -0
@@ -637,6 +637,14 @@ generic_disarm_name:
637
637
  test_negative_examples:
638
638
  - 'T0131.001' # is id
639
639
 
640
+ ####### Sector ########
641
+ generic_sector_aliases:
642
+ test_positive_examples:
643
+ - Biotechnology
644
+ - Diplomatic Organizations
645
+ test_negative_examples:
646
+ - Random Company Inc
647
+
640
648
  ####### Misc STIX Objects #######
641
649
 
642
650
  lookup_attack_pattern:
txt2stix/retriever.py CHANGED
@@ -138,6 +138,12 @@ def _retrieve_stix_objects(host, knowledge_base, filter_value):
138
138
  return retreiver.get_objects_by_alias(filter_value, "attack-mobile")
139
139
  case "mitre-attack-ics-aliases":
140
140
  return retreiver.get_objects_by_alias(filter_value, "attack-ics")
141
+
142
+ ### Sector
143
+ case 'sector-alias':
144
+ return retreiver.get_objects_by_alias(filter_value, 'sector')
145
+ case 'sector-name':
146
+ return retreiver.get_objects_by_name(filter_value, 'sector')
141
147
 
142
148
  ### OTHERS by Name
143
149
  case "mitre-capec-name":
@@ -1,6 +1,6 @@
1
1
  Metadata-Version: 2.4
2
2
  Name: txt2stix
3
- Version: 1.1.7
3
+ Version: 1.1.9
4
4
  Summary: txt2stix is a Python script that is designed to identify and extract IoCs and TTPs from text files, identify the relationships between them, convert them to STIX 2.1 objects, and output as a STIX 2.1 bundle.
5
5
  Project-URL: Homepage, https://github.com/muchdogesec/txt2stix
6
6
  Project-URL: Issues, https://github.com/muchdogesec/txt2stix/issues
@@ -14,6 +14,7 @@ Classifier: Programming Language :: Python :: 3
14
14
  Requires-Python: >=3.9
15
15
  Requires-Dist: base58>=2.1.1
16
16
  Requires-Dist: beautifulsoup4>=4.12.3
17
+ Requires-Dist: json-repair
17
18
  Requires-Dist: llama-index-core>=0.12.42
18
19
  Requires-Dist: llama-index-llms-openai>=0.4.5
19
20
  Requires-Dist: mistune>=3.0.2
@@ -6,7 +6,7 @@ txt2stix/credential_checker.py,sha256=eWDP-jY3-jm8zI0JMoUcyoQZ_JqPNfCIr_HAO8nVYz
6
6
  txt2stix/extractions.py,sha256=_tlsqYHhfAoV-PJzxRHysrX47uxCsMlSg7PQWxww1u0,2171
7
7
  txt2stix/indicator.py,sha256=dyf4wbvVrZRitZpm6t7UusSM98bVW1qc5UkdGpVm3ls,30025
8
8
  txt2stix/lookups.py,sha256=h42YVtYUkWZm6ZPv2h5hHDHDzDs3yBqrT_T7pj2MDZI,2301
9
- txt2stix/retriever.py,sha256=0eoLzabGrcR0wdQuEYdU8ZPomq42lAsGwP4gY6RLgww,6410
9
+ txt2stix/retriever.py,sha256=sMNhnEYk3l5W44qZsWaDQtJYoHXA1oYIPM6wDqiUHSg,6642
10
10
  txt2stix/stix.py,sha256=9nXD9a2dCY4uaatl-mlIA1k3srwQBhGW-tUSho3iYe0,30
11
11
  txt2stix/txt2stix.py,sha256=l889ysbkZLFoSLak6Hv4IN8sr0HillVp4cbC2WS-UkI,18769
12
12
  txt2stix/utils.py,sha256=n6mh4t9ZRJ7iT4Jvp9ai_dfCXjgXNcRtF_zXO7nkpnk,3304
@@ -18,7 +18,7 @@ txt2stix/ai_extractor/gemini.py,sha256=yJC7knYzl-TScyCBd-MTpUf-NT6znC25E7vXxNMqj
18
18
  txt2stix/ai_extractor/openai.py,sha256=1RxaLy0TJ4GjNKmcJoi6ZiBrCS_gt5ql9jpeE-SOy8g,642
19
19
  txt2stix/ai_extractor/openrouter.py,sha256=hAA6mTOMcpA28XYsOCvuJH7WMJqXCxfqZGJf_VrDsIk,628
20
20
  txt2stix/ai_extractor/prompts.py,sha256=NtqtVyPPtShPlVZ5SrFmo-LCkfpANIIi4H9rjqaxqDo,10559
21
- txt2stix/ai_extractor/utils.py,sha256=jG5tPuS2xfiH7xCxlaEkAOboNOOMDah9JpGDXrUUJBA,4342
21
+ txt2stix/ai_extractor/utils.py,sha256=K3qglBRWYAuRU806-ahbz_PK1qQFfJ7ueWybVxYZYlQ,4425
22
22
  txt2stix/pattern/__init__.py,sha256=K9ofaP2AOikvzb48VSBpJZijckdqufZxSzr_kbRypLY,491
23
23
  txt2stix/pattern/extractors/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
24
24
  txt2stix/pattern/extractors/base_extractor.py,sha256=ly80rp-L40g7DbhrGiCvhPWI95-ZFMtAQUEC-fH6Y-o,6130
@@ -74,47 +74,48 @@ txt2stix/pattern/extractors/url/url_extractor.py,sha256=-SH1WvxbViaRZ1on8lRlzNAc
74
74
  txt2stix/pattern/extractors/url/url_file_extractor.py,sha256=_VDu_BX3Ys9SKhZlscZPp9xSOKCxNKKvJ2gbe7Nvuv0,881
75
75
  txt2stix/pattern/extractors/url/url_path_extractor.py,sha256=FNKcMZRnJpcZZF44T8DHsDWzhBqPq5a23h7T7l2osac,2459
76
76
  txt2stix/includes/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
77
- txt2stix/includes/extractions/ai/config.yaml,sha256=0-jgrxsEEIZBs274WI4Trz3vgk6BW2hzV3p0jGnoKmA,41564
78
- txt2stix/includes/extractions/lookup/config.yaml,sha256=iT0lHHlMdx719qA2tyI_zsWqk9SUS6jmZtBY9_H-i4A,12062
77
+ txt2stix/includes/extractions/ai/config.yaml,sha256=BO8C09vCa92Qys1gWSuPkek6gTOv3LqvXTtLohSM8zs,43741
78
+ txt2stix/includes/extractions/lookup/config.yaml,sha256=m97Rzst-Fq3sMI7KV0mEuOqlbI1-0fU6UoicqDY1vng,12494
79
79
  txt2stix/includes/extractions/pattern/config.yaml,sha256=92buge3fYegXIN1TSjLKq4PdIbKAGvDAc4CoQpR38sA,20196
80
80
  txt2stix/includes/helpers/mimetype_filename_extension_list.csv,sha256=kgozjMyp7y87CqRcoedfDwNXSLKrDgC9r9YKDYK0EbY,27593
81
81
  txt2stix/includes/helpers/stix_relationship_types.txt,sha256=PQytANVSrWepdK_SLEZtfiTe1eoxj6YMGUZslO_C1oc,505
82
82
  txt2stix/includes/helpers/tlds.txt,sha256=Va_awj-FQiKgs5ace6C0kC5xxAHIl9yAIBhvT08Q7Q0,9551
83
83
  txt2stix/includes/helpers/windows_registry_key_prefix.txt,sha256=J5gU4FsqmOVYt6cVRgwCG7odYEWk-UPLpuCiDwpzBfg,145
84
84
  txt2stix/includes/lookups/_README.md,sha256=OGkyqCcqAOPI-JLE81zAmyg4sHW5apJNhDFcvHUW1nc,338
85
- txt2stix/includes/lookups/_generate_lookups.py,sha256=ex12zxiFnKYHgsXfcDX4OL-KyrjAXSlvzeYVUzUD2lE,9390
85
+ txt2stix/includes/lookups/_generate_lookups.py,sha256=Fpw15Fme5GmIG2cbfkKwvxPgxuwhFW1dHGfxEpO9Mzk,9725
86
86
  txt2stix/includes/lookups/attack_pattern.txt,sha256=4ARDLG-cwUqk6_TO_JAY6hNJg6KRbAaIr-Or5nML6io,15
87
87
  txt2stix/includes/lookups/campaign.txt,sha256=N66XO0H3Rx-3Tvo7wwHDouckIT0tGlGVyCDKxDs1KnM,11
88
88
  txt2stix/includes/lookups/country_iso3166_alpha2.txt,sha256=LMM7j50NoBv7BlK64mpmE3Dbef9_tNBUNbuTXOEIvCo,746
89
89
  txt2stix/includes/lookups/course_of_action.txt,sha256=MK5H4XuJ0GI0-r3hFPJx2BE4hwkHOpRWhfUcsXJVNVg,12
90
- txt2stix/includes/lookups/disarm_id_v1_5.txt,sha256=swvhv7mH3kMZZgNUP_lVIfbfIXQdl8K2baY22gSU4TQ,2953
91
- txt2stix/includes/lookups/disarm_name_v1_5.txt,sha256=R4XRwzSdD0urRLPvkBADZXbvB5ZzzjFciRKJS1JmVTw,8223
90
+ txt2stix/includes/lookups/disarm_id_v1_6.txt,sha256=91j9jZ1OQmAF8FoZEUhLEHPy7hbFO1Fjr_ueXJl-9aA,3584
91
+ txt2stix/includes/lookups/disarm_name_v1_6.txt,sha256=iFI3s2vKFgXwS7Jjsb2vczaXxYkDXqiBoqevZYRlweA,9481
92
92
  txt2stix/includes/lookups/extensions.txt,sha256=MjDwm2uE-L5Bfs1c9cby5uKtamY1Cpnji1uVTzyTGZY,322
93
93
  txt2stix/includes/lookups/identity.txt,sha256=aNtsHZ_fILCdsClZ6YaXHM1VdLxERmLZHm25pouhLu0,22
94
94
  txt2stix/includes/lookups/infrastructure.txt,sha256=tipCQ2gAvz00W8MpmwU20NHXyIF9-BhGYzPzOfmgdrk,9
95
95
  txt2stix/includes/lookups/intrusion_set.txt,sha256=mTwnPAweH1lKm4pwO-sOUYhrwKr7rIQwOS7PGnKX5q8,7
96
96
  txt2stix/includes/lookups/malware.txt,sha256=RTAcQnj2Ueb0Omv0WJZSvkPNV_ByW-PuFa-BAJmr6Oo,16
97
- txt2stix/includes/lookups/mitre_atlas_id_v4_5_2.txt,sha256=4CGvG8h5fMnzy-4BS_yAsVaZpQOTLIb3J0tmk8m0FdI,1317
98
- txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt,sha256=uJ2_cyEGBm3Yp51bgBX4FDz4rBJ21BTh1f4nrKwfECI,2585
99
- txt2stix/includes/lookups/mitre_attack_enterprise_aliases_v16_0.txt,sha256=LgRBOkI6gsl4jlkx-LuH13Ar7NCuKJGsCcBQZowOf0I,15391
100
- txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt,sha256=gmoK9nQn_CcMgIbLlVL2cdRhq22xJDrTda2uahLAStg,11798
101
- txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt,sha256=oxWaWzcNBqaux_VJw0ZIMLlm-D_mdQe7kQR2m3cnql4,26633
102
- txt2stix/includes/lookups/mitre_attack_ics_aliases_v16_0.txt,sha256=9KfLuhR52a6dZ_oerzv7OSKil0fWcH4wOoijR1cUpU4,1706
103
- txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt,sha256=FyPJbYlsp9Z_xIclO1YmfUBp6RTdCV8epge-Jg3VsDI,1552
104
- txt2stix/includes/lookups/mitre_attack_ics_name_v16_0.txt,sha256=ilFja5D49bLinIhM4D-fXpnFD2yED4jNwLrw-uNL9dQ,5873
105
- txt2stix/includes/lookups/mitre_attack_mobile_aliases_v16_0.txt,sha256=M9uJJJPQbzBOsfcXL0nKCQwUI8nWXIiB71iv8UKx3wQ,1690
106
- txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt,sha256=cSo5PXodeg0QoQocbagfklj_UpAYJ_umZqguJZQfSWM,1863
107
- txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt,sha256=jCbYyUN2-4lmMCnodRrx3eG20l85nBkfZohTD8VRv3I,5003
97
+ txt2stix/includes/lookups/mitre_atlas_id_v4_9_0.txt,sha256=5ZJel1M8v37J1eBDMpvDUfu2K_ZdDpiEbQiY1am2KAI,1762
98
+ txt2stix/includes/lookups/mitre_atlas_name_v4_9_0.txt,sha256=4wvLO2PbDXDwl4WqA4DqtPYOO__NYxytxHZC9FS3mTw,3419
99
+ txt2stix/includes/lookups/mitre_attack_enterprise_aliases_v18_0.txt,sha256=isPkSwtxU4XKRkmrs7pckU3qUnNFubTmDhvuGS-CFl0,17212
100
+ txt2stix/includes/lookups/mitre_attack_enterprise_id_v18_0.txt,sha256=2NzaVBOnCSV34JJFhCUutuVit17I7Wg327nW7rqHMsk,30898
101
+ txt2stix/includes/lookups/mitre_attack_enterprise_name_v18_0.txt,sha256=f9hQik8S4VKsfzXPqwcuH2Gv498kzEcmlLivEYo60Bk,94459
102
+ txt2stix/includes/lookups/mitre_attack_ics_aliases_v18_0.txt,sha256=7FqfAxrMTwkgVpMIww-Umpp4C9qLMaTKUTCZnJo82UM,1759
103
+ txt2stix/includes/lookups/mitre_attack_ics_id_v18_0.txt,sha256=cNyabZpRhpSiHxvmI7BcubcBcmDroIDavep9oP3qUVA,2755
104
+ txt2stix/includes/lookups/mitre_attack_ics_name_v18_0.txt,sha256=7J7hzitw1_DkfW5Wk2OflosDKi9WDPA286HWVIx4qnY,8976
105
+ txt2stix/includes/lookups/mitre_attack_mobile_aliases_v18_0.txt,sha256=NrUSKcy-ykjpB0ePfZb_qMVQ-Gm20C4jIwJ2VnO4KK8,2068
106
+ txt2stix/includes/lookups/mitre_attack_mobile_id_v18_0.txt,sha256=ttojXP3ebRqtP4gFL25QlFvaor1kZUTIaa0YH2AU_VQ,4533
107
+ txt2stix/includes/lookups/mitre_attack_mobile_name_v18_0.txt,sha256=l12wY4czon1r1G6Df_HyXMZ4mi4-tnwdTMaM9SvRn88,12605
108
108
  txt2stix/includes/lookups/mitre_capec_id_v3_9.txt,sha256=0lP55QibGp8A_jmeBziQHNofCcyLKZX0338W6XRFND0,5485
109
- txt2stix/includes/lookups/mitre_capec_name_v3_9.txt,sha256=vjtXAb7K5MXJs6X0mUBm88gVzhxTOAXHZIlo-aSG15w,16622
110
- txt2stix/includes/lookups/mitre_cwe_id_v4_15.txt,sha256=URYertSUwg30N_mwhsz6HmfAfbgzPotKJxdHaj_VWcM,7659
111
- txt2stix/includes/lookups/mitre_cwe_name_v4_15.txt,sha256=f_NcLGaZSoiQNbcXWEyKEk9DWJzdGgnGVGSwCxnqlNs,43813
109
+ txt2stix/includes/lookups/mitre_capec_name_v3_9.txt,sha256=q5deJHntBfFeuMiA8rt1QjF05b7d54ZL155XCcjUO7k,16622
110
+ txt2stix/includes/lookups/mitre_cwe_id_v4_18.txt,sha256=6dMQYX0deEApD3RMRWNJKM30T_6HP2oaN6hSMfYlf5s,7704
111
+ txt2stix/includes/lookups/mitre_cwe_name_v4_18.txt,sha256=NK67bJKArr7UR5CiICVoi8G5ItVGw0zm9i-8jZghkRg,44133
112
+ txt2stix/includes/lookups/sector_aliases_v1_0.txt,sha256=f5ErsLGseoGxE9z6DOLtHheUAgx7kAoQi6PGMVgBnCA,13097
112
113
  txt2stix/includes/lookups/threat_actor.txt,sha256=QfDO9maQuqKBgW_Sdd7VGv1SHZ9Ra-uv7tIhiPMhBL0,7
113
114
  txt2stix/includes/lookups/tld.txt,sha256=-MEgJea2NMG_KDsnc4BVvI8eRk5Dm93L-t8SGYx5wMo,8598
114
115
  txt2stix/includes/lookups/tool.txt,sha256=HGKG6JpUE26w6ezzSxOjBkp15UpSaB7N-mZ_NU_3G7A,6
115
- txt2stix/includes/tests/test_cases.yaml,sha256=QD1FdIunpPkOpsn6wJRqs2vil_hv8OSVaqUp4a96aZg,22247
116
- txt2stix-1.1.7.dist-info/METADATA,sha256=nrWNRYJkFKHGJG3J8x8SFRGrrnc7l-zpaCiPfZr7rNM,15333
117
- txt2stix-1.1.7.dist-info/WHEEL,sha256=qtCwoSJWgHk21S1Kb4ihdzI2rlJ1ZKaIurTj_ngOhyQ,87
118
- txt2stix-1.1.7.dist-info/entry_points.txt,sha256=x6QPtt65hWeomw4IpJ_wQUesBl1M4WOLODbhOKyWMFg,55
119
- txt2stix-1.1.7.dist-info/licenses/LICENSE,sha256=BK8Ppqlc4pdgnNzIxnxde0taoQ1BgicdyqmBvMiNYgY,11364
120
- txt2stix-1.1.7.dist-info/RECORD,,
116
+ txt2stix/includes/tests/test_cases.yaml,sha256=vErA3c5fySeWvJ5yJ8dCTEo3ufRATASAjaF4gj4Az1M,22424
117
+ txt2stix-1.1.9.dist-info/METADATA,sha256=hCoWslm4bXSWYimxA2XCozIzXP2i07nBQCc8ujVTPo4,15360
118
+ txt2stix-1.1.9.dist-info/WHEEL,sha256=qtCwoSJWgHk21S1Kb4ihdzI2rlJ1ZKaIurTj_ngOhyQ,87
119
+ txt2stix-1.1.9.dist-info/entry_points.txt,sha256=x6QPtt65hWeomw4IpJ_wQUesBl1M4WOLODbhOKyWMFg,55
120
+ txt2stix-1.1.9.dist-info/licenses/LICENSE,sha256=BK8Ppqlc4pdgnNzIxnxde0taoQ1BgicdyqmBvMiNYgY,11364
121
+ txt2stix-1.1.9.dist-info/RECORD,,
@@ -1,117 +0,0 @@
1
- Reconnaissance
2
- Resource Development
3
- Initial Access
4
- ML Model Access
5
- Execution
6
- Persistence
7
- Privilege Escalation
8
- Defense Evasion
9
- Credential Access
10
- Discovery
11
- Collection
12
- ML Attack Staging
13
- Exfiltration
14
- Impact
15
- Search for Victim's Publicly Available Research Materials
16
- Journals and Conference Proceedings
17
- Pre-Print Repositories
18
- Technical Blogs
19
- Search for Publicly Available Adversarial Vulnerability Analysis
20
- Search Victim-Owned Websites
21
- Search Application Repositories
22
- Active Scanning
23
- Acquire Public ML Artifacts
24
- Datasets
25
- Models
26
- Obtain Capabilities
27
- Adversarial ML Attack Implementations
28
- Software Tools
29
- Develop Capabilities
30
- Adversarial ML Attacks
31
- Acquire Infrastructure
32
- ML Development Workspaces
33
- Consumer Hardware
34
- Publish Poisoned Datasets
35
- ML Supply Chain Compromise
36
- GPU Hardware
37
- ML Software
38
- Data
39
- Model
40
- ML Model Inference API Access
41
- ML-Enabled Product or Service
42
- Physical Environment Access
43
- Full ML Model Access
44
- Discover ML Model Ontology
45
- Discover ML Model Family
46
- Poison Training Data
47
- Establish Accounts
48
- Create Proxy ML Model
49
- Train Proxy via Gathered ML Artifacts
50
- Train Proxy via Replication
51
- Use Pre-Trained Model
52
- Discover ML Artifacts
53
- User Execution
54
- Unsafe ML Artifacts
55
- Valid Accounts
56
- Evade ML Model
57
- Backdoor ML Model
58
- Poison ML Model
59
- Inject Payload
60
- Exfiltration via ML Inference API
61
- Infer Training Data Membership
62
- Invert ML Model
63
- Extract ML Model
64
- Exfiltration via Cyber Means
65
- Denial of ML Service
66
- Spamming ML System with Chaff Data
67
- Erode ML Model Integrity
68
- Cost Harvesting
69
- ML Artifact Collection
70
- Data from Information Repositories
71
- Data from Local System
72
- Verify Attack
73
- Craft Adversarial Data
74
- White-Box Optimization
75
- Black-Box Optimization
76
- Black-Box Transfer
77
- Manual Modification
78
- Insert Backdoor Trigger
79
- External Harms
80
- Financial Harm
81
- Reputational Harm
82
- Societal Harm
83
- User Harm
84
- ML Intellectual Property Theft
85
- Exploit Public-Facing Application
86
- Command and Scripting Interpreter
87
- LLM Prompt Injection
88
- Direct
89
- Indirect
90
- Phishing
91
- Spearphishing via Social Engineering LLM
92
- LLM Plugin Compromise
93
- LLM Jailbreak
94
- Unsecured Credentials
95
- LLM Meta Prompt Extraction
96
- LLM Data Leakage
97
- Limit Release of Public Information
98
- Limit Model Artifact Release
99
- Passive ML Output Obfuscation
100
- Model Hardening
101
- Restrict Number of ML Model Queries
102
- Control Access to ML Models and Data at Rest
103
- Use Ensemble Methods
104
- Sanitize Training Data
105
- Validate ML Model
106
- Use Multi-Modal Sensors
107
- Input Restoration
108
- Restrict Library Loading
109
- Encrypt Sensitive Information
110
- Code Signing
111
- Verify ML Artifacts
112
- Adversarial Input Detection
113
- Vulnerability Scanning
114
- Model Distribution Methods
115
- User Training
116
- Control Access to ML Models and Data in Production
117
- ATLAS