
    <i(                     8   S r SrSrSrSrSrSrSrSrS	r	S
r
\\\\\\\\\	\
/
rSrSrSrSrSrSr\\\\\\/rSrSrSrSrSrSrSrSrSrSrSrSrSrSr \\\\\\\\\\\\\\ /r!Sr"Sr#Sr$S r%S!r&\"\#\$\%\&/r'S"r(S#r)S$r*S%r+S&r,S'r-\(\)\*\+\,\-/r.S(r/S)r0S*r1S+r2S,r3S-r4S.r5S/r6S0r7S1r8S2r9S3r:S4r;S5r<S6r=S7r>S8r?S9r@S:rAS;rBS<rCS=rDS>rES?rFS@rGSArHSBrI\/\0\1\2\3\4\5\6\7\8\9\:\;\<\=\>\?\@\A\B\C\D\E\F\G\H\I/rJSCrKSDrLSErMSFrNSGrOSHrPSIrQSJrRSKrSSLrTSMrUSNrVSOrWSPrXSQrYSRrZSSr[\K\L\M\N\O\P\Q\R\S\T\U\V\W\X\Y\Z\[/r\STr]SUr^SVr_SWr`SXraSYrbSZrcS[rdS\reS]rfS^rg\]\^\_\`\a\b\c\d\e\f\g/rhS_riS`rjSarkSbrlScrmSdrnSeroSfrpSgrqShrrSirs\i\j\k\l\m\n\o\p\q\r\s/rtSjruSkrvSlrwSmrxSnrySorzSpr{\u\v\w\x\y\z\{/r|Sqr}Srr~SsrStrSurSvrSwr\}\~\\\\\/rSxrSyrSzrS{rS|rS}rS~r\\\\\\\/rg)z&
STIX 2.0 open vocabularies and enums

accidentalcoercion	dominanceideology	notorietyzorganizational-gainzpersonal-gainzpersonal-satisfactionrevengeunpredictable
individualclubcontestteamorganization
governmentMD5MD6z
RIPEMD-160zSHA-1zSHA-224zSHA-256zSHA-384zSHA-512zSHA3-224zSHA3-256zSHA3-384zSHA3-512ssdeep	WHIRLPOOLgroupclassunknownzanomalous-activityanonymizationbenigncompromisedzmalicious-activityattributionagriculture	aerospace
automotivecommunicationsconstructiondefence	educationenergyentertainmentzfinancial-serviceszgovernment-nationalzgovernment-regionalzgovernment-localzgovernment-public-services
healthcarezhospitality-leisureinfrastructure	insurancemanufacturingminingz
non-profitpharmaceuticalsretail
technologytelecommunicationstransportation	utilitiesadwarebackdoorbotddosdropperzexploit-kit	keylogger
ransomwarezremote-access-trojanzresource-exploitationzrogue-security-softwarerootkitzscreen-capturespywaretrojanviruswormzthreat-reportzattack-patterncampaignidentity	indicatorzintrusion-setmalwarezobserved-datazthreat-actortoolvulnerabilityactivist
competitorzcrime-syndicatecriminalhackerzinsider-accidentalzinsider-disgruntledznation-statesensationalistspy	terroristagentdirectorindependentzinfrastructure-architectzinfrastructure-operatorzmalware-authorsponsornoneminimalintermediateadvancedexpert	innovator	strategiczdenial-of-serviceexploitationzinformation-gatheringznetwork-capturezcredential-exploitationzremote-accesszvulnerability-scanningN)__doc__ATTACK_MOTIVATION_ACCIDENTALATTACK_MOTIVATION_COERCIONATTACK_MOTIVATION_DOMINANCEATTACK_MOTIVATION_IDEOLOGYATTACK_MOTIVATION_NOTORIETY%ATTACK_MOTIVATION_ORGANIZATIONAL_GAINATTACK_MOTIVATION_PERSONAL_GAIN'ATTACK_MOTIVATION_PERSONAL_SATISFACTIONATTACK_MOTIVATION_REVENGEATTACK_MOTIVATION_UNPREDICTABLEATTACK_MOTIVATION ATTACK_RESOURCE_LEVEL_INDIVIDUALATTACK_RESOURCE_LEVEL_CLUBATTACK_RESOURCE_LEVEL_CONTESTATTACK_RESOURCE_LEVEL_TEAM"ATTACK_RESOURCE_LEVEL_ORGANIZATION ATTACK_RESOURCE_LEVEL_GOVERNMENTATTACK_RESOURCE_LEVELHASHING_ALGORITHM_MD5HASHING_ALGORITHM_MD6HASHING_ALGORITHM_RIPEMD_160HASHING_ALGORITHM_SHA_1HASHING_ALGORITHM_SHA_224HASHING_ALGORITHM_SHA_256HASHING_ALGORITHM_SHA_384HASHING_ALGORITHM_SHA_512HASHING_ALGORITHM_SHA3_224HASHING_ALGORITHM_SHA3_256HASHING_ALGORITHM_SHA3_384HASHING_ALGORITHM_SHA3_512HASHING_ALGORITHM_SSDEEPHASHING_ALGORITHM_WHIRLPOOLHASHING_ALGORITHMIDENTITY_CLASS_INDIVIDUALIDENTITY_CLASS_GROUPIDENTITY_CLASS_ORGANIZATIONIDENTITY_CLASS_CLASSIDENTITY_CLASS_UNKNOWNIDENTITY_CLASS"INDICATOR_LABEL_ANOMALOUS_ACTIVITYINDICATOR_LABEL_ANONYMIZATIONINDICATOR_LABEL_BENIGNINDICATOR_LABEL_COMPROMISED"INDICATOR_LABEL_MALICIOUS_ACTIVITYINDICATOR_LABEL_ATTRIBUTIONINDICATOR_LABELINDUSTRY_SECTOR_AGRICULTUREINDUSTRY_SECTOR_AEROSPACEINDUSTRY_SECTOR_AUTOMOTIVEINDUSTRY_SECTOR_COMMUNICATIONSINDUSTRY_SECTOR_CONSTRUCTIONINDUSTRY_SECTOR_DEFENCEINDUSTRY_SECTOR_EDUCATIONINDUSTRY_SECTOR_ENERGYINDUSTRY_SECTOR_ENTERTAINMENT"INDUSTRY_SECTOR_FINANCIAL_SERVICES#INDUSTRY_SECTOR_GOVERNMENT_NATIONAL#INDUSTRY_SECTOR_GOVERNMENT_REGIONAL INDUSTRY_SECTOR_GOVERNMENT_LOCAL*INDUSTRY_SECTOR_GOVERNMENT_PUBLIC_SERVICESINDUSTRY_SECTOR_HEALTHCARE#INDUSTRY_SECTOR_HOSPITALITY_LEISUREINDUSTRY_SECTOR_INFRASTRUCTUREINDUSTRY_SECTOR_INSURANCEINDUSTRY_SECTOR_MANUFACTURINGINDUSTRY_SECTOR_MININGINDUSTRY_SECTOR_NON_PROFITINDUSTRY_SECTOR_PHARMACEUTICALSINDUSTRY_SECTOR_RETAILINDUSTRY_SECTOR_TECHNOLOGY"INDUSTRY_SECTOR_TELECOMMUNICATIONSINDUSTRY_SECTOR_TRANSPORTATIONINDUSTRY_SECTOR_UTILITIESINDUSTRY_SECTORMALWARE_LABEL_ADWAREMALWARE_LABEL_BACKDOORMALWARE_LABEL_BOTMALWARE_LABEL_DDOSMALWARE_LABEL_DROPPERMALWARE_LABEL_EXPLOIT_KITMALWARE_LABEL_KEYLOGGERMALWARE_LABEL_RANSOMWARE"MALWARE_LABEL_REMOTE_ACCESS_TROJAN#MALWARE_LABEL_RESOURCE_EXPLOITATION%MALWARE_LABEL_ROGUE_SECURITY_SOFTWAREMALWARE_LABEL_ROOTKITMALWARE_LABEL_SCREEN_CAPTUREMALWARE_LABEL_SPYWAREMALWARE_LABEL_TROJANMALWARE_LABEL_VIRUSMALWARE_LABEL_WORMMALWARE_LABELREPORT_LABEL_THREAT_REPORTREPORT_LABEL_ATTACK_PATTERNREPORT_LABEL_CAMPAIGNREPORT_LABEL_IDENTITYREPORT_LABEL_INDICATORREPORT_LABEL_INTRUSION_SETREPORT_LABEL_MALWAREREPORT_LABEL_OBSERVED_DATAREPORT_LABEL_THREAT_ACTORREPORT_LABEL_TOOLREPORT_LABEL_VULNERABILITYREPORT_LABELTHREAT_ACTOR_LABEL_ACTIVISTTHREAT_ACTOR_LABEL_COMPETITOR"THREAT_ACTOR_LABEL_CRIME_SYNDICATETHREAT_ACTOR_LABEL_CRIMINALTHREAT_ACTOR_LABEL_HACKER%THREAT_ACTOR_LABEL_INSIDER_ACCIDENTAL&THREAT_ACTOR_LABEL_INSIDER_DISGRUNTLEDTHREAT_ACTOR_LABEL_NATION_STATE!THREAT_ACTOR_LABEL_SENSATIONALISTTHREAT_ACTOR_LABEL_SPYTHREAT_ACTOR_LABEL_TERRORISTTHREAT_ACTOR_LABELTHREAT_ACTOR_ROLE_AGENTTHREAT_ACTOR_ROLE_DIRECTORTHREAT_ACTOR_ROLE_INDEPENDENT*THREAT_ACTOR_ROLE_INFRASTRUCTURE_ARCHITECT)THREAT_ACTOR_ROLE_INFRASTRUCTURE_OPERATOR THREAT_ACTOR_ROLE_MALWARE_AUTHORTHREAT_ACTOR_ROLE_SPONSORTHREAT_ACTOR_ROLE THREAT_ACTOR_SOPHISTICATION_NONE#THREAT_ACTOR_SOPHISTICATION_MINIMAL(THREAT_ACTOR_SOPHISTICATION_INTERMEDIATE$THREAT_ACTOR_SOPHISTICATION_ADVANCED"THREAT_ACTOR_SOPHISTICATION_EXPERT%THREAT_ACTOR_SOPHISTICATION_INNOVATOR%THREAT_ACTOR_SOPHISTICATION_STRATEGICTHREAT_ACTOR_SOPHISTICATIONTOOL_LABEL_DENIAL_OF_SERVICETOOL_LABEL_EXPLOITATION TOOL_LABEL_INFORMATION_GATHERINGTOOL_LABEL_NETWORK_CAPTURE"TOOL_LABEL_CREDENTIAL_EXPLOITATIONTOOL_LABEL_REMOTE_ACCESS!TOOL_LABEL_VULNERABILITY_SCANNING
TOOL_LABEL     I/home/james-whalen/.local/lib/python3.13/site-packages/stix2/v20/vocab.py<module>r      s    , ' ) ' ) (= %"1 *A '% "1  !)#+#  $0  #  ) # %3 "#/   %!&$    + ! % % % % ' ' ' ' # )    $ )  ,  "   &: " / ! + %9 "+  '!& , ' ) !1 - # ' !  / %9 "&; #&; ##5  -I *) &; #!1 '  / ! ) "3 ! ) %9 "!1 '   " !&''$.'"!#&"7>   #   ! ) % ' %; "&= #(A %! / !     &') #* - . " " $ ,   , *  ,   )  , %6 "( $ (< %)> &"0 $4 ! *   !&)*#%   " '  - -G *,E )#3  %  !.-$  $*  &/ #+9 ('1 $%- "(3 %(3 % %',(&))   3 ( #:  . %> "* $< ! !$&%
r   