txt2stix 1.1.8__py3-none-any.whl → 1.1.9__py3-none-any.whl
This diff represents the content of publicly available package versions that have been released to one of the supported registries. The information contained in this diff is provided for informational purposes only and reflects changes between package versions as they appear in their respective public registries.
- txt2stix/includes/extractions/ai/config.yaml +20 -0
- txt2stix/includes/extractions/lookup/config.yaml +33 -15
- txt2stix/includes/lookups/_generate_lookups.py +39 -30
- txt2stix/includes/lookups/{disarm_id_v1_5.txt → disarm_id_v1_6.txt} +95 -32
- txt2stix/includes/lookups/{disarm_name_v1_5.txt → disarm_name_v1_6.txt} +380 -317
- txt2stix/includes/lookups/{mitre_atlas_id_v4_5_2.txt → mitre_atlas_id_v4_9_0.txt} +41 -1
- txt2stix/includes/lookups/mitre_atlas_name_v4_9_0.txt +157 -0
- txt2stix/includes/lookups/{mitre_attack_enterprise_aliases_v16_0.txt → mitre_attack_enterprise_aliases_v18_0.txt} +679 -531
- txt2stix/includes/lookups/mitre_attack_enterprise_id_v18_0.txt +4293 -0
- txt2stix/includes/lookups/mitre_attack_enterprise_name_v18_0.txt +4295 -0
- txt2stix/includes/lookups/{mitre_attack_ics_aliases_v16_0.txt → mitre_attack_ics_aliases_v18_0.txt} +7 -3
- txt2stix/includes/lookups/mitre_attack_ics_id_v18_0.txt +410 -0
- txt2stix/includes/lookups/{mitre_attack_ics_name_v16_0.txt → mitre_attack_ics_name_v18_0.txt} +172 -53
- txt2stix/includes/lookups/{mitre_attack_mobile_aliases_v16_0.txt → mitre_attack_mobile_aliases_v18_0.txt} +33 -0
- txt2stix/includes/lookups/mitre_attack_mobile_id_v18_0.txt +643 -0
- txt2stix/includes/lookups/mitre_attack_mobile_name_v18_0.txt +645 -0
- txt2stix/includes/lookups/mitre_capec_name_v3_9.txt +522 -522
- txt2stix/includes/lookups/{mitre_cwe_id_v4_15.txt → mitre_cwe_id_v4_18.txt} +5 -0
- txt2stix/includes/lookups/{mitre_cwe_name_v4_15.txt → mitre_cwe_name_v4_18.txt} +889 -884
- txt2stix/includes/lookups/sector_aliases_v1_0.txt +751 -0
- txt2stix/includes/tests/test_cases.yaml +8 -0
- txt2stix/retriever.py +6 -0
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/METADATA +1 -1
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/RECORD +27 -26
- txt2stix/includes/lookups/mitre_atlas_name_v4_5_2.txt +0 -117
- txt2stix/includes/lookups/mitre_attack_enterprise_id_v16_0.txt +0 -1656
- txt2stix/includes/lookups/mitre_attack_enterprise_name_v16_0.txt +0 -1765
- txt2stix/includes/lookups/mitre_attack_ics_id_v16_0.txt +0 -254
- txt2stix/includes/lookups/mitre_attack_mobile_id_v16_0.txt +0 -277
- txt2stix/includes/lookups/mitre_attack_mobile_name_v16_0.txt +0 -296
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/WHEEL +0 -0
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/entry_points.txt +0 -0
- {txt2stix-1.1.8.dist-info → txt2stix-1.1.9.dist-info}/licenses/LICENSE +0 -0
|
@@ -637,6 +637,14 @@ generic_disarm_name:
|
|
|
637
637
|
test_negative_examples:
|
|
638
638
|
- 'T0131.001' # is id
|
|
639
639
|
|
|
640
|
+
####### Sector ########
|
|
641
|
+
generic_sector_aliases:
|
|
642
|
+
test_positive_examples:
|
|
643
|
+
- Biotechnology
|
|
644
|
+
- Diplomatic Organizations
|
|
645
|
+
test_negative_examples:
|
|
646
|
+
- Random Company Inc
|
|
647
|
+
|
|
640
648
|
####### Misc STIX Objects #######
|
|
641
649
|
|
|
642
650
|
lookup_attack_pattern:
|
txt2stix/retriever.py
CHANGED
|
@@ -138,6 +138,12 @@ def _retrieve_stix_objects(host, knowledge_base, filter_value):
|
|
|
138
138
|
return retreiver.get_objects_by_alias(filter_value, "attack-mobile")
|
|
139
139
|
case "mitre-attack-ics-aliases":
|
|
140
140
|
return retreiver.get_objects_by_alias(filter_value, "attack-ics")
|
|
141
|
+
|
|
142
|
+
### Sector
|
|
143
|
+
case 'sector-alias':
|
|
144
|
+
return retreiver.get_objects_by_alias(filter_value, 'sector')
|
|
145
|
+
case 'sector-name':
|
|
146
|
+
return retreiver.get_objects_by_name(filter_value, 'sector')
|
|
141
147
|
|
|
142
148
|
### OTHERS by Name
|
|
143
149
|
case "mitre-capec-name":
|
|
@@ -1,6 +1,6 @@
|
|
|
1
1
|
Metadata-Version: 2.4
|
|
2
2
|
Name: txt2stix
|
|
3
|
-
Version: 1.1.
|
|
3
|
+
Version: 1.1.9
|
|
4
4
|
Summary: txt2stix is a Python script that is designed to identify and extract IoCs and TTPs from text files, identify the relationships between them, convert them to STIX 2.1 objects, and output as a STIX 2.1 bundle.
|
|
5
5
|
Project-URL: Homepage, https://github.com/muchdogesec/txt2stix
|
|
6
6
|
Project-URL: Issues, https://github.com/muchdogesec/txt2stix/issues
|
|
@@ -6,7 +6,7 @@ txt2stix/credential_checker.py,sha256=eWDP-jY3-jm8zI0JMoUcyoQZ_JqPNfCIr_HAO8nVYz
|
|
|
6
6
|
txt2stix/extractions.py,sha256=_tlsqYHhfAoV-PJzxRHysrX47uxCsMlSg7PQWxww1u0,2171
|
|
7
7
|
txt2stix/indicator.py,sha256=dyf4wbvVrZRitZpm6t7UusSM98bVW1qc5UkdGpVm3ls,30025
|
|
8
8
|
txt2stix/lookups.py,sha256=h42YVtYUkWZm6ZPv2h5hHDHDzDs3yBqrT_T7pj2MDZI,2301
|
|
9
|
-
txt2stix/retriever.py,sha256=
|
|
9
|
+
txt2stix/retriever.py,sha256=sMNhnEYk3l5W44qZsWaDQtJYoHXA1oYIPM6wDqiUHSg,6642
|
|
10
10
|
txt2stix/stix.py,sha256=9nXD9a2dCY4uaatl-mlIA1k3srwQBhGW-tUSho3iYe0,30
|
|
11
11
|
txt2stix/txt2stix.py,sha256=l889ysbkZLFoSLak6Hv4IN8sr0HillVp4cbC2WS-UkI,18769
|
|
12
12
|
txt2stix/utils.py,sha256=n6mh4t9ZRJ7iT4Jvp9ai_dfCXjgXNcRtF_zXO7nkpnk,3304
|
|
@@ -74,47 +74,48 @@ txt2stix/pattern/extractors/url/url_extractor.py,sha256=-SH1WvxbViaRZ1on8lRlzNAc
|
|
|
74
74
|
txt2stix/pattern/extractors/url/url_file_extractor.py,sha256=_VDu_BX3Ys9SKhZlscZPp9xSOKCxNKKvJ2gbe7Nvuv0,881
|
|
75
75
|
txt2stix/pattern/extractors/url/url_path_extractor.py,sha256=FNKcMZRnJpcZZF44T8DHsDWzhBqPq5a23h7T7l2osac,2459
|
|
76
76
|
txt2stix/includes/__init__.py,sha256=47DEQpj8HBSa-_TImW-5JCeuQeRkm5NMpJWZG3hSuFU,0
|
|
77
|
-
txt2stix/includes/extractions/ai/config.yaml,sha256=
|
|
78
|
-
txt2stix/includes/extractions/lookup/config.yaml,sha256=
|
|
77
|
+
txt2stix/includes/extractions/ai/config.yaml,sha256=BO8C09vCa92Qys1gWSuPkek6gTOv3LqvXTtLohSM8zs,43741
|
|
78
|
+
txt2stix/includes/extractions/lookup/config.yaml,sha256=m97Rzst-Fq3sMI7KV0mEuOqlbI1-0fU6UoicqDY1vng,12494
|
|
79
79
|
txt2stix/includes/extractions/pattern/config.yaml,sha256=92buge3fYegXIN1TSjLKq4PdIbKAGvDAc4CoQpR38sA,20196
|
|
80
80
|
txt2stix/includes/helpers/mimetype_filename_extension_list.csv,sha256=kgozjMyp7y87CqRcoedfDwNXSLKrDgC9r9YKDYK0EbY,27593
|
|
81
81
|
txt2stix/includes/helpers/stix_relationship_types.txt,sha256=PQytANVSrWepdK_SLEZtfiTe1eoxj6YMGUZslO_C1oc,505
|
|
82
82
|
txt2stix/includes/helpers/tlds.txt,sha256=Va_awj-FQiKgs5ace6C0kC5xxAHIl9yAIBhvT08Q7Q0,9551
|
|
83
83
|
txt2stix/includes/helpers/windows_registry_key_prefix.txt,sha256=J5gU4FsqmOVYt6cVRgwCG7odYEWk-UPLpuCiDwpzBfg,145
|
|
84
84
|
txt2stix/includes/lookups/_README.md,sha256=OGkyqCcqAOPI-JLE81zAmyg4sHW5apJNhDFcvHUW1nc,338
|
|
85
|
-
txt2stix/includes/lookups/_generate_lookups.py,sha256=
|
|
85
|
+
txt2stix/includes/lookups/_generate_lookups.py,sha256=Fpw15Fme5GmIG2cbfkKwvxPgxuwhFW1dHGfxEpO9Mzk,9725
|
|
86
86
|
txt2stix/includes/lookups/attack_pattern.txt,sha256=4ARDLG-cwUqk6_TO_JAY6hNJg6KRbAaIr-Or5nML6io,15
|
|
87
87
|
txt2stix/includes/lookups/campaign.txt,sha256=N66XO0H3Rx-3Tvo7wwHDouckIT0tGlGVyCDKxDs1KnM,11
|
|
88
88
|
txt2stix/includes/lookups/country_iso3166_alpha2.txt,sha256=LMM7j50NoBv7BlK64mpmE3Dbef9_tNBUNbuTXOEIvCo,746
|
|
89
89
|
txt2stix/includes/lookups/course_of_action.txt,sha256=MK5H4XuJ0GI0-r3hFPJx2BE4hwkHOpRWhfUcsXJVNVg,12
|
|
90
|
-
txt2stix/includes/lookups/
|
|
91
|
-
txt2stix/includes/lookups/
|
|
90
|
+
txt2stix/includes/lookups/disarm_id_v1_6.txt,sha256=91j9jZ1OQmAF8FoZEUhLEHPy7hbFO1Fjr_ueXJl-9aA,3584
|
|
91
|
+
txt2stix/includes/lookups/disarm_name_v1_6.txt,sha256=iFI3s2vKFgXwS7Jjsb2vczaXxYkDXqiBoqevZYRlweA,9481
|
|
92
92
|
txt2stix/includes/lookups/extensions.txt,sha256=MjDwm2uE-L5Bfs1c9cby5uKtamY1Cpnji1uVTzyTGZY,322
|
|
93
93
|
txt2stix/includes/lookups/identity.txt,sha256=aNtsHZ_fILCdsClZ6YaXHM1VdLxERmLZHm25pouhLu0,22
|
|
94
94
|
txt2stix/includes/lookups/infrastructure.txt,sha256=tipCQ2gAvz00W8MpmwU20NHXyIF9-BhGYzPzOfmgdrk,9
|
|
95
95
|
txt2stix/includes/lookups/intrusion_set.txt,sha256=mTwnPAweH1lKm4pwO-sOUYhrwKr7rIQwOS7PGnKX5q8,7
|
|
96
96
|
txt2stix/includes/lookups/malware.txt,sha256=RTAcQnj2Ueb0Omv0WJZSvkPNV_ByW-PuFa-BAJmr6Oo,16
|
|
97
|
-
txt2stix/includes/lookups/
|
|
98
|
-
txt2stix/includes/lookups/
|
|
99
|
-
txt2stix/includes/lookups/
|
|
100
|
-
txt2stix/includes/lookups/
|
|
101
|
-
txt2stix/includes/lookups/
|
|
102
|
-
txt2stix/includes/lookups/
|
|
103
|
-
txt2stix/includes/lookups/
|
|
104
|
-
txt2stix/includes/lookups/
|
|
105
|
-
txt2stix/includes/lookups/
|
|
106
|
-
txt2stix/includes/lookups/
|
|
107
|
-
txt2stix/includes/lookups/
|
|
97
|
+
txt2stix/includes/lookups/mitre_atlas_id_v4_9_0.txt,sha256=5ZJel1M8v37J1eBDMpvDUfu2K_ZdDpiEbQiY1am2KAI,1762
|
|
98
|
+
txt2stix/includes/lookups/mitre_atlas_name_v4_9_0.txt,sha256=4wvLO2PbDXDwl4WqA4DqtPYOO__NYxytxHZC9FS3mTw,3419
|
|
99
|
+
txt2stix/includes/lookups/mitre_attack_enterprise_aliases_v18_0.txt,sha256=isPkSwtxU4XKRkmrs7pckU3qUnNFubTmDhvuGS-CFl0,17212
|
|
100
|
+
txt2stix/includes/lookups/mitre_attack_enterprise_id_v18_0.txt,sha256=2NzaVBOnCSV34JJFhCUutuVit17I7Wg327nW7rqHMsk,30898
|
|
101
|
+
txt2stix/includes/lookups/mitre_attack_enterprise_name_v18_0.txt,sha256=f9hQik8S4VKsfzXPqwcuH2Gv498kzEcmlLivEYo60Bk,94459
|
|
102
|
+
txt2stix/includes/lookups/mitre_attack_ics_aliases_v18_0.txt,sha256=7FqfAxrMTwkgVpMIww-Umpp4C9qLMaTKUTCZnJo82UM,1759
|
|
103
|
+
txt2stix/includes/lookups/mitre_attack_ics_id_v18_0.txt,sha256=cNyabZpRhpSiHxvmI7BcubcBcmDroIDavep9oP3qUVA,2755
|
|
104
|
+
txt2stix/includes/lookups/mitre_attack_ics_name_v18_0.txt,sha256=7J7hzitw1_DkfW5Wk2OflosDKi9WDPA286HWVIx4qnY,8976
|
|
105
|
+
txt2stix/includes/lookups/mitre_attack_mobile_aliases_v18_0.txt,sha256=NrUSKcy-ykjpB0ePfZb_qMVQ-Gm20C4jIwJ2VnO4KK8,2068
|
|
106
|
+
txt2stix/includes/lookups/mitre_attack_mobile_id_v18_0.txt,sha256=ttojXP3ebRqtP4gFL25QlFvaor1kZUTIaa0YH2AU_VQ,4533
|
|
107
|
+
txt2stix/includes/lookups/mitre_attack_mobile_name_v18_0.txt,sha256=l12wY4czon1r1G6Df_HyXMZ4mi4-tnwdTMaM9SvRn88,12605
|
|
108
108
|
txt2stix/includes/lookups/mitre_capec_id_v3_9.txt,sha256=0lP55QibGp8A_jmeBziQHNofCcyLKZX0338W6XRFND0,5485
|
|
109
|
-
txt2stix/includes/lookups/mitre_capec_name_v3_9.txt,sha256=
|
|
110
|
-
txt2stix/includes/lookups/
|
|
111
|
-
txt2stix/includes/lookups/
|
|
109
|
+
txt2stix/includes/lookups/mitre_capec_name_v3_9.txt,sha256=q5deJHntBfFeuMiA8rt1QjF05b7d54ZL155XCcjUO7k,16622
|
|
110
|
+
txt2stix/includes/lookups/mitre_cwe_id_v4_18.txt,sha256=6dMQYX0deEApD3RMRWNJKM30T_6HP2oaN6hSMfYlf5s,7704
|
|
111
|
+
txt2stix/includes/lookups/mitre_cwe_name_v4_18.txt,sha256=NK67bJKArr7UR5CiICVoi8G5ItVGw0zm9i-8jZghkRg,44133
|
|
112
|
+
txt2stix/includes/lookups/sector_aliases_v1_0.txt,sha256=f5ErsLGseoGxE9z6DOLtHheUAgx7kAoQi6PGMVgBnCA,13097
|
|
112
113
|
txt2stix/includes/lookups/threat_actor.txt,sha256=QfDO9maQuqKBgW_Sdd7VGv1SHZ9Ra-uv7tIhiPMhBL0,7
|
|
113
114
|
txt2stix/includes/lookups/tld.txt,sha256=-MEgJea2NMG_KDsnc4BVvI8eRk5Dm93L-t8SGYx5wMo,8598
|
|
114
115
|
txt2stix/includes/lookups/tool.txt,sha256=HGKG6JpUE26w6ezzSxOjBkp15UpSaB7N-mZ_NU_3G7A,6
|
|
115
|
-
txt2stix/includes/tests/test_cases.yaml,sha256=
|
|
116
|
-
txt2stix-1.1.
|
|
117
|
-
txt2stix-1.1.
|
|
118
|
-
txt2stix-1.1.
|
|
119
|
-
txt2stix-1.1.
|
|
120
|
-
txt2stix-1.1.
|
|
116
|
+
txt2stix/includes/tests/test_cases.yaml,sha256=vErA3c5fySeWvJ5yJ8dCTEo3ufRATASAjaF4gj4Az1M,22424
|
|
117
|
+
txt2stix-1.1.9.dist-info/METADATA,sha256=hCoWslm4bXSWYimxA2XCozIzXP2i07nBQCc8ujVTPo4,15360
|
|
118
|
+
txt2stix-1.1.9.dist-info/WHEEL,sha256=qtCwoSJWgHk21S1Kb4ihdzI2rlJ1ZKaIurTj_ngOhyQ,87
|
|
119
|
+
txt2stix-1.1.9.dist-info/entry_points.txt,sha256=x6QPtt65hWeomw4IpJ_wQUesBl1M4WOLODbhOKyWMFg,55
|
|
120
|
+
txt2stix-1.1.9.dist-info/licenses/LICENSE,sha256=BK8Ppqlc4pdgnNzIxnxde0taoQ1BgicdyqmBvMiNYgY,11364
|
|
121
|
+
txt2stix-1.1.9.dist-info/RECORD,,
|
|
@@ -1,117 +0,0 @@
|
|
|
1
|
-
Reconnaissance
|
|
2
|
-
Resource Development
|
|
3
|
-
Initial Access
|
|
4
|
-
ML Model Access
|
|
5
|
-
Execution
|
|
6
|
-
Persistence
|
|
7
|
-
Privilege Escalation
|
|
8
|
-
Defense Evasion
|
|
9
|
-
Credential Access
|
|
10
|
-
Discovery
|
|
11
|
-
Collection
|
|
12
|
-
ML Attack Staging
|
|
13
|
-
Exfiltration
|
|
14
|
-
Impact
|
|
15
|
-
Search for Victim's Publicly Available Research Materials
|
|
16
|
-
Journals and Conference Proceedings
|
|
17
|
-
Pre-Print Repositories
|
|
18
|
-
Technical Blogs
|
|
19
|
-
Search for Publicly Available Adversarial Vulnerability Analysis
|
|
20
|
-
Search Victim-Owned Websites
|
|
21
|
-
Search Application Repositories
|
|
22
|
-
Active Scanning
|
|
23
|
-
Acquire Public ML Artifacts
|
|
24
|
-
Datasets
|
|
25
|
-
Models
|
|
26
|
-
Obtain Capabilities
|
|
27
|
-
Adversarial ML Attack Implementations
|
|
28
|
-
Software Tools
|
|
29
|
-
Develop Capabilities
|
|
30
|
-
Adversarial ML Attacks
|
|
31
|
-
Acquire Infrastructure
|
|
32
|
-
ML Development Workspaces
|
|
33
|
-
Consumer Hardware
|
|
34
|
-
Publish Poisoned Datasets
|
|
35
|
-
ML Supply Chain Compromise
|
|
36
|
-
GPU Hardware
|
|
37
|
-
ML Software
|
|
38
|
-
Data
|
|
39
|
-
Model
|
|
40
|
-
ML Model Inference API Access
|
|
41
|
-
ML-Enabled Product or Service
|
|
42
|
-
Physical Environment Access
|
|
43
|
-
Full ML Model Access
|
|
44
|
-
Discover ML Model Ontology
|
|
45
|
-
Discover ML Model Family
|
|
46
|
-
Poison Training Data
|
|
47
|
-
Establish Accounts
|
|
48
|
-
Create Proxy ML Model
|
|
49
|
-
Train Proxy via Gathered ML Artifacts
|
|
50
|
-
Train Proxy via Replication
|
|
51
|
-
Use Pre-Trained Model
|
|
52
|
-
Discover ML Artifacts
|
|
53
|
-
User Execution
|
|
54
|
-
Unsafe ML Artifacts
|
|
55
|
-
Valid Accounts
|
|
56
|
-
Evade ML Model
|
|
57
|
-
Backdoor ML Model
|
|
58
|
-
Poison ML Model
|
|
59
|
-
Inject Payload
|
|
60
|
-
Exfiltration via ML Inference API
|
|
61
|
-
Infer Training Data Membership
|
|
62
|
-
Invert ML Model
|
|
63
|
-
Extract ML Model
|
|
64
|
-
Exfiltration via Cyber Means
|
|
65
|
-
Denial of ML Service
|
|
66
|
-
Spamming ML System with Chaff Data
|
|
67
|
-
Erode ML Model Integrity
|
|
68
|
-
Cost Harvesting
|
|
69
|
-
ML Artifact Collection
|
|
70
|
-
Data from Information Repositories
|
|
71
|
-
Data from Local System
|
|
72
|
-
Verify Attack
|
|
73
|
-
Craft Adversarial Data
|
|
74
|
-
White-Box Optimization
|
|
75
|
-
Black-Box Optimization
|
|
76
|
-
Black-Box Transfer
|
|
77
|
-
Manual Modification
|
|
78
|
-
Insert Backdoor Trigger
|
|
79
|
-
External Harms
|
|
80
|
-
Financial Harm
|
|
81
|
-
Reputational Harm
|
|
82
|
-
Societal Harm
|
|
83
|
-
User Harm
|
|
84
|
-
ML Intellectual Property Theft
|
|
85
|
-
Exploit Public-Facing Application
|
|
86
|
-
Command and Scripting Interpreter
|
|
87
|
-
LLM Prompt Injection
|
|
88
|
-
Direct
|
|
89
|
-
Indirect
|
|
90
|
-
Phishing
|
|
91
|
-
Spearphishing via Social Engineering LLM
|
|
92
|
-
LLM Plugin Compromise
|
|
93
|
-
LLM Jailbreak
|
|
94
|
-
Unsecured Credentials
|
|
95
|
-
LLM Meta Prompt Extraction
|
|
96
|
-
LLM Data Leakage
|
|
97
|
-
Limit Release of Public Information
|
|
98
|
-
Limit Model Artifact Release
|
|
99
|
-
Passive ML Output Obfuscation
|
|
100
|
-
Model Hardening
|
|
101
|
-
Restrict Number of ML Model Queries
|
|
102
|
-
Control Access to ML Models and Data at Rest
|
|
103
|
-
Use Ensemble Methods
|
|
104
|
-
Sanitize Training Data
|
|
105
|
-
Validate ML Model
|
|
106
|
-
Use Multi-Modal Sensors
|
|
107
|
-
Input Restoration
|
|
108
|
-
Restrict Library Loading
|
|
109
|
-
Encrypt Sensitive Information
|
|
110
|
-
Code Signing
|
|
111
|
-
Verify ML Artifacts
|
|
112
|
-
Adversarial Input Detection
|
|
113
|
-
Vulnerability Scanning
|
|
114
|
-
Model Distribution Methods
|
|
115
|
-
User Training
|
|
116
|
-
Control Access to ML Models and Data in Production
|
|
117
|
-
ATLAS
|