txt2stix 1.1.8__py3-none-any.whl → 1.1.10__py3-none-any.whl

This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
Files changed (33) hide show
  1. txt2stix/includes/extractions/ai/config.yaml +20 -0
  2. txt2stix/includes/extractions/lookup/config.yaml +33 -15
  3. txt2stix/includes/lookups/_generate_lookups.py +39 -30
  4. txt2stix/includes/lookups/{disarm_id_v1_5.txt → disarm_id_v1_6.txt} +95 -32
  5. txt2stix/includes/lookups/{disarm_name_v1_5.txt → disarm_name_v1_6.txt} +380 -317
  6. txt2stix/includes/lookups/{mitre_atlas_id_v4_5_2.txt → mitre_atlas_id_v4_9_0.txt} +41 -1
  7. txt2stix/includes/lookups/mitre_atlas_name_v4_9_0.txt +157 -0
  8. txt2stix/includes/lookups/{mitre_attack_enterprise_aliases_v16_0.txt → mitre_attack_enterprise_aliases_v18_0.txt} +679 -531
  9. txt2stix/includes/lookups/mitre_attack_enterprise_id_v18_0.txt +4293 -0
  10. txt2stix/includes/lookups/mitre_attack_enterprise_name_v18_0.txt +4295 -0
  11. txt2stix/includes/lookups/{mitre_attack_ics_aliases_v16_0.txt → mitre_attack_ics_aliases_v18_0.txt} +7 -3
  12. txt2stix/includes/lookups/mitre_attack_ics_id_v18_0.txt +410 -0
  13. txt2stix/includes/lookups/{mitre_attack_ics_name_v16_0.txt → mitre_attack_ics_name_v18_0.txt} +172 -53
  14. txt2stix/includes/lookups/{mitre_attack_mobile_aliases_v16_0.txt → mitre_attack_mobile_aliases_v18_0.txt} +33 -0
  15. txt2stix/includes/lookups/mitre_attack_mobile_id_v18_0.txt +643 -0
  16. txt2stix/includes/lookups/mitre_attack_mobile_name_v18_0.txt +645 -0
  17. txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +522 -522
  18. txt2stix/includes/lookups/{mitre_cwe_id_v4_15.txt → mitre_cwe_id_v4_18.txt} +5 -0
  19. txt2stix/includes/lookups/{mitre_cwe_name_v4_15.txt → mitre_cwe_name_v4_18.txt} +889 -884
  20. txt2stix/includes/lookups/sector_aliases_v1_0.txt +751 -0
  21. txt2stix/includes/tests/test_cases.yaml +8 -0
  22. txt2stix/retriever.py +6 -0
  23. {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/METADATA +2 -10
  24. {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/RECORD +27 -26
  25. txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +0 -117
  26. txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +0 -1656
  27. txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +0 -1765
  28. txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +0 -254
  29. txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +0 -277
  30. txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +0 -296
  31. {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/WHEEL +0 -0
  32. {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/entry_points.txt +0 -0
  33. {txt2stix-1.1.8.dist-info → txt2stix-1.1.10.dist-info}/licenses/LICENSE +0 -0
@@ -1,296 +0,0 @@
1
- Mobile ATT&CK
2
- Scheduled Task/Job
3
- Adversary-in-the-Middle
4
- Abuse Elevation Control Mechanism
5
- Remote Access Software
6
- Uninstall Malicious Application
7
- Indicator Removal on Host
8
- Supply Chain Compromise
9
- Impersonate SS7 Nodes
10
- Match Legitimate Name or Location
11
- Protected User Data
12
- Asymmetric Cryptography
13
- Software Discovery
14
- Process Discovery
15
- Call Log
16
- Security Software Discovery
17
- Ptrace System Calls
18
- Impair Defenses
19
- Exploitation of Remote Services
20
- Web Protocols
21
- Steal Application Access Token
22
- User Evasion
23
- Virtualization/Sandbox Evasion
24
- Application Versioning
25
- Command and Scripting Interpreter
26
- Disable or Modify Tools
27
- Ingress Tool Transfer
28
- Dynamic Resolution
29
- Network Service Scanning
30
- Exfiltration Over C2 Channel
31
- Exploitation for Privilege Escalation
32
- Call Control
33
- Exfiltration Over Unencrypted Non-C2 Protocol
34
- Broadcast Receivers
35
- Access Notifications
36
- Exfiltration Over Alternative Protocol
37
- Internet Connection Discovery
38
- Boot or Logon Initialization Scripts
39
- Execution Guardrails
40
- GUI Input Capture
41
- Compromise Client Software Binary
42
- Software Packing
43
- Native API
44
- Exploitation for Client Execution
45
- Proxy Through Victim
46
- Foreground Persistence
47
- Replication Through Removable Media
48
- Audio Capture
49
- Hijack Execution Flow
50
- Unix Shell
51
- Application Layer Protocol
52
- Download New Code at Runtime
53
- Exploitation for Initial Access
54
- System Checks
55
- Stored Application Data
56
- Screen Capture
57
- Transmitted Data Manipulation
58
- Compromise Software Dependencies and Development Tools
59
- URI Hijacking
60
- Subvert Trust Controls
61
- Keychain
62
- Bidirectional Communication
63
- Non-Standard Port
64
- Compromise Software Supply Chain
65
- Dead Drop Resolver
66
- Location Tracking
67
- Device Administrator Permissions
68
- Remote Device Management Services
69
- Data Destruction
70
- Input Capture
71
- Generate Traffic from Victim
72
- Disguise Root/Jailbreak Indicators
73
- Calendar Entries
74
- File Deletion
75
- Device Lockout
76
- Keylogging
77
- SMS Control
78
- Process Injection
79
- Symmetric Cryptography
80
- Wi-Fi Discovery
81
- Compromise Hardware Supply Chain
82
- Clipboard Data
83
- Data Manipulation
84
- SMS Messages
85
- Web Service
86
- System Runtime API Hijacking
87
- Credentials from Password Store
88
- Hooking
89
- File and Directory Discovery
90
- Obfuscated Files or Information
91
- Input Injection
92
- Network Denial of Service
93
- Compromise Application Executable
94
- Event Triggered Execution
95
- System Network Configuration Discovery
96
- Video Capture
97
- One-Way Communication
98
- Data Encrypted for Impact
99
- Prevent Application Removal
100
- System Network Connections Discovery
101
- Phishing
102
- SSL Pinning
103
- Lockscreen Bypass
104
- Contact List
105
- Data from Local System
106
- Account Access Removal
107
- System Information Discovery
108
- Archive Collected Data
109
- Geofencing
110
- Conceal Multimedia Files
111
- Endpoint Denial of Service
112
- Out of Band Data
113
- Encrypted Channel
114
- Suppress Application Icon
115
- Masquerading
116
- Steganography
117
- Hide Artifacts
118
- Code Signing Policy Modification
119
- Domain Generation Algorithms
120
- Drive-By Compromise
121
- Operation Dust Storm
122
- C0033
123
- Use Recent OS Version
124
- Application Developer Guidance
125
- Enterprise Policy
126
- User Guidance
127
- Do Not Mitigate
128
- Antivirus/Antimalware
129
- System Partition Integrity
130
- Encrypt Network Traffic
131
- Lock Bootloader
132
- Security Updates
133
- Deploy Compromised Device Detection Method
134
- Interconnection Filtering
135
- Attestation
136
- The MITRE Corporation
137
- Bouncing Golf
138
- UNC788
139
- Sandworm Team
140
- Scattered Spider
141
- Confucius
142
- MoustachedBouncer
143
- BITTER
144
- APT-C-23
145
- Dark Caracal
146
- Windshift
147
- APT28
148
- Earth Lusca
149
- PROMETHIUM
150
- CarbonSteal
151
- Cerberus
152
- DroidJack
153
- Rotexy
154
- Stealth Mango
155
- Allwinner
156
- GoldenEagle
157
- FlixOnline
158
- Bread
159
- Hornbill
160
- Judy
161
- OldBoot
162
- Gooligan
163
- SpyNote RAT
164
- TrickMo
165
- INSOMNIA
166
- Dvmap
167
- Zen
168
- NotCompatible
169
- AhRat
170
- XLoader for Android
171
- Trojan-SMS.AndroidOS.FakeInst.a
172
- XLoader for iOS
173
- AbstractEmu
174
- Chameleon
175
- Exodus
176
- Dendroid
177
- WireLurker
178
- Desert Scorpion
179
- Pegasus for iOS
180
- Tangelo
181
- RCSAndroid
182
- Corona Updates
183
- Skygofree
184
- KeyRaider
185
- ZergHelper
186
- DoubleAgent
187
- Twitoor
188
- Fakecalls
189
- S.O.V.A.
190
- ANDROIDOS_ANSERVER.A
191
- DualToy
192
- Mandrake
193
- HilalRAT
194
- X-Agent for Android
195
- DEFENSOR ID
196
- BRATA
197
- MazarBOT
198
- Ginp
199
- HummingWhale
200
- eSurv
201
- TangleBot
202
- Monokle
203
- Red Alert 2.0
204
- ViceLeaker
205
- FlyTrap
206
- FakeSpy
207
- SpyDealer
208
- Concipit1248
209
- RuMMS
210
- Pegasus for Android
211
- FrozenCell
212
- AndroidOS/MalLocker.B
213
- SharkBot
214
- RedDrop
215
- CHEMISTGAMES
216
- YiSpecter
217
- Trojan-SMS.AndroidOS.Agent.ao
218
- BOULDSPY
219
- Anubis
220
- AndroRAT
221
- FinFisher
222
- Agent Smith
223
- Asacub
224
- GPlayed
225
- EventBot
226
- HenBox
227
- Riltok
228
- GolfSpy
229
- Pallas
230
- Circles
231
- Tiktok Pro
232
- PJApps
233
- ShiftyBug
234
- HummingBad
235
- Exobot
236
- OBAD
237
- Android/Chuli.A
238
- Charger
239
- Drinik
240
- Trojan-SMS.AndroidOS.OpFake.a
241
- XcodeGhost
242
- SilkBean
243
- WolfRAT
244
- BusyGasper
245
- BrainTest
246
- TERRACOTTA
247
- Escobar
248
- Triada
249
- Golden Cup
250
- FluBot
251
- ViperRAT
252
- Adups
253
- SimBad
254
- Android/AdDisplay.Ashas
255
- Phenakite
256
- TianySpy
257
- Sunbird
258
- DressCode
259
- Gustuff
260
- None
261
- FlexiSpy
262
- Xbot
263
- Network Connection Creation
264
- Network Traffic Content
265
- Process Creation
266
- System Settings
267
- API Calls
268
- Application Assets
269
- Process Termination
270
- Command Execution
271
- Protected Configuration
272
- Network Communication
273
- Host Status
274
- Network Traffic Flow
275
- Permissions Requests
276
- System Notifications
277
- Permissions Request
278
- Process Metadata
279
- Sensor Health
280
- User Interface
281
- Command
282
- Network Traffic
283
- Application Vetting
284
- Process
285
- Initial Access
286
- Exfiltration
287
- Persistence
288
- Privilege Escalation
289
- Command and Control
290
- Execution
291
- Impact
292
- Credential Access
293
- Collection
294
- Lateral Movement
295
- Defense Evasion
296
- Discovery