138 lines
4.5 KiB
Python
138 lines
4.5 KiB
Python
"""STIX 2.1 API Objects.
|
|
|
|
.. autosummary::
|
|
:toctree: v21
|
|
|
|
bundle
|
|
common
|
|
observables
|
|
sdo
|
|
sro
|
|
|
|
|
|
|
"""
|
|
|
|
# flake8: noqa
|
|
|
|
from .base import (
|
|
_DomainObject, _Extension, _Observable, _RelationshipObject, _STIXBase21,
|
|
)
|
|
from .bundle import Bundle
|
|
from .common import (
|
|
TLP_AMBER, TLP_GREEN, TLP_RED, TLP_WHITE, CustomExtension, CustomMarking,
|
|
ExtensionDefinition, ExternalReference, GranularMarking, KillChainPhase,
|
|
LanguageContent, MarkingDefinition, StatementMarking, TLPMarking,
|
|
)
|
|
from .observables import (
|
|
URL, AlternateDataStream, ArchiveExt, Artifact, AutonomousSystem,
|
|
CustomObservable, Directory, DomainName, EmailAddress,
|
|
EmailMessage, EmailMIMEComponent, File, HTTPRequestExt, ICMPExt,
|
|
IPv4Address, IPv6Address, MACAddress, Mutex, NetworkTraffic, NTFSExt,
|
|
PDFExt, Process, RasterImageExt, SocketExt, Software, TCPExt,
|
|
UNIXAccountExt, UserAccount, WindowsPEBinaryExt,
|
|
WindowsPEOptionalHeaderType, WindowsPESection, WindowsProcessExt,
|
|
WindowsRegistryKey, WindowsRegistryValueType, WindowsServiceExt,
|
|
X509Certificate, X509V3ExtensionsType,
|
|
)
|
|
from .sdo import (
|
|
AttackPattern, Campaign, CourseOfAction, CustomObject, Grouping, Identity,
|
|
Incident, Indicator, Infrastructure, IntrusionSet, Location, Malware,
|
|
MalwareAnalysis, Note, ObservedData, Opinion, Report, ThreatActor, Tool,
|
|
Vulnerability,
|
|
)
|
|
from .sro import Relationship, Sighting
|
|
|
|
OBJ_MAP = {
|
|
'attack-pattern': AttackPattern,
|
|
'bundle': Bundle,
|
|
'campaign': Campaign,
|
|
'course-of-action': CourseOfAction,
|
|
'grouping': Grouping,
|
|
'identity': Identity,
|
|
'incident': Incident,
|
|
'indicator': Indicator,
|
|
'infrastructure': Infrastructure,
|
|
'intrusion-set': IntrusionSet,
|
|
'language-content': LanguageContent,
|
|
'location': Location,
|
|
'malware': Malware,
|
|
'malware-analysis': MalwareAnalysis,
|
|
'note': Note,
|
|
'marking-definition': MarkingDefinition,
|
|
'observed-data': ObservedData,
|
|
'opinion': Opinion,
|
|
'report': Report,
|
|
'relationship': Relationship,
|
|
'threat-actor': ThreatActor,
|
|
'tool': Tool,
|
|
'sighting': Sighting,
|
|
'extension-definition': ExtensionDefinition,
|
|
'vulnerability': Vulnerability,
|
|
}
|
|
|
|
OBJ_MAP_OBSERVABLE = {
|
|
'artifact': Artifact,
|
|
'autonomous-system': AutonomousSystem,
|
|
'directory': Directory,
|
|
'domain-name': DomainName,
|
|
'email-addr': EmailAddress,
|
|
'email-message': EmailMessage,
|
|
'file': File,
|
|
'ipv4-addr': IPv4Address,
|
|
'ipv6-addr': IPv6Address,
|
|
'mac-addr': MACAddress,
|
|
'mutex': Mutex,
|
|
'network-traffic': NetworkTraffic,
|
|
'process': Process,
|
|
'software': Software,
|
|
'url': URL,
|
|
'user-account': UserAccount,
|
|
'windows-registry-key': WindowsRegistryKey,
|
|
'x509-certificate': X509Certificate,
|
|
}
|
|
|
|
EXT_MAP = {
|
|
'archive-ext': ArchiveExt,
|
|
'ntfs-ext': NTFSExt,
|
|
'pdf-ext': PDFExt,
|
|
'raster-image-ext': RasterImageExt,
|
|
'windows-pebinary-ext': WindowsPEBinaryExt,
|
|
'http-request-ext': HTTPRequestExt,
|
|
'icmp-ext': ICMPExt,
|
|
'socket-ext': SocketExt,
|
|
'tcp-ext': TCPExt,
|
|
'windows-process-ext': WindowsProcessExt,
|
|
'windows-service-ext': WindowsServiceExt,
|
|
'unix-account-ext': UNIXAccountExt,
|
|
}
|
|
|
|
# Ensure star-imports from this module get the right symbols. "base" is a
|
|
# known problem, since there are multiple modules with that name and one can
|
|
# accidentally overwrite another.
|
|
__all__ = """
|
|
Bundle,
|
|
|
|
TLP_AMBER, TLP_GREEN, TLP_RED, TLP_WHITE, CustomMarking, ExtensionDefinition,
|
|
ExternalReference, GranularMarking, KillChainPhase, LanguageContent,
|
|
MarkingDefinition, StatementMarking, TLPMarking,
|
|
|
|
URL, AlternateDataStream, ArchiveExt, Artifact, AutonomousSystem,
|
|
CustomExtension, CustomObservable, Directory, DomainName, EmailAddress,
|
|
EmailMessage, EmailMIMEComponent, File, HTTPRequestExt, ICMPExt,
|
|
IPv4Address, IPv6Address, MACAddress, Mutex, NetworkTraffic, NTFSExt,
|
|
PDFExt, Process, RasterImageExt, SocketExt, Software, TCPExt,
|
|
UNIXAccountExt, UserAccount, WindowsPEBinaryExt,
|
|
WindowsPEOptionalHeaderType, WindowsPESection, WindowsProcessExt,
|
|
WindowsRegistryKey, WindowsRegistryValueType, WindowsServiceExt,
|
|
X509Certificate, X509V3ExtensionsType,
|
|
|
|
AttackPattern, Campaign, CourseOfAction, CustomObject, Grouping, Identity,
|
|
Incident, Indicator, Infrastructure, IntrusionSet, Location, Malware,
|
|
MalwareAnalysis, Note, ObservedData, Opinion, Report, ThreatActor, Tool,
|
|
Vulnerability,
|
|
|
|
Relationship, Sighting,
|
|
|
|
OBJ_MAP, OBJ_MAP_OBSERVABLE, EXT_MAP
|
|
""".replace(",", " ").split()
|