A TTP is an instance of a Tool, Technique, or Procedure used by a cyber actor
Property | Type | Description | Required? |
---|---|---|---|
id | String | ✓ | |
schema_version | String | CTIM schema version for this entity | ✓ |
ttp_type | String | type of this TTP | ✓ |
type | TTPTypeIdentifier String | ✓ | |
valid_time | ValidTime Object | a timestamp for the definition of a specific version of a TTP item | ✓ |
behavior | Behavior Object | describes the attack patterns, malware, or exploits that the attacker leverages to execute this TTP | |
description | String | ||
external_ids | String List | ||
intended_effect | IntendedEffect String List | the suspected intended effect for this TTP | |
kill_chains | KillChain String List | ||
language | String | ||
resources | Resource Object | infrastructure or tools that the adversary uses to execute this TTP | |
revision | Integer | ||
short_description | String | ||
source | String | ||
source_uri | String | ||
timestamp | Inst (Date) | ||
title | String | ||
tlp | TLP String | ||
victim_targeting | VictimTargeting Object | characterizes the people, organizations, information or access being targeted |
describes the attack patterns, malware, or exploits that the attacker leverages to execute this TTP
This entry is optional
This entry is required
judgment-de305d54-75b4-431b-adb2-eb6b9e546014
for a Judgement. This ID type compares to the STIX id field. The optional STIX idref field is not used.the suspected intended effect for this TTP
This entry is optional
This entry's type is sequential (allows zero or more values)
This entry is optional
This entry's type is sequential (allows zero or more values)
This entry is optional
infrastructure or tools that the adversary uses to execute this TTP
This entry is optional
CTIM schema version for this entity
This entry is required
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
This entry is optional
type of this TTP
This entry is required
This entry is required
a timestamp for the definition of a specific version of a TTP item
characterizes the people, organizations, information or access being targeted
Period of time when a cyber observation is valid.
Property | Type | Description | Required? |
---|---|---|---|
end_time | Inst (Date) | If end_time is not present, then the valid time position of the object does not have an upper bound. | |
start_time | Inst (Date) | If not present, the valid time position of the indicator does not have an upper bound |
If end_time is not present, then the valid time position of the object does not have an upper bound.
This entry is optional
If not present, the valid time position of the indicator does not have an upper bound
This entry is optional
Property | Type | Description | Required? |
---|---|---|---|
attack_patterns | AttackPattern Object List | one or more Attack Patterns for this TTP | |
malware_type | MalwareInstance Object List | one or more instances of Malware for this TTP |
one or more Attack Patterns for this TTP
one or more instances of Malware for this TTP
Property | Type | Description | Required? |
---|---|---|---|
description | String | ||
short_description | String | ||
title | String | ||
type | MalwareType String List | a characterization of what type of malware this |
This entry is optional
This entry is optional
This entry is optional
a characterization of what type of malware this
This entry is optional
This entry's type is sequential (allows zero or more values)
Property | Type | Description | Required? |
---|---|---|---|
capec_id | String | a reference to a particular entry within the Common Attack Pattern Enumeration and Classification | |
description | String | ||
short_description | String | ||
title | String |
a reference to a particular entry within the Common Attack Pattern Enumeration and Classification
This entry is optional
This entry is optional
This entry is optional
Property | Type | Description | Required? |
---|---|---|---|
infrastructure | Infrastructure Object | infrastructure observed to have been utilized for cyber attack | |
personas | Identity Object | ||
tools | Tool Object | The tool leveraged by this TTP |
infrastructure observed to have been utilized for cyber attack
The tool leveraged by this TTP
Describes a person or an organization
Property | Type | Description | Required? |
---|---|---|---|
description | String | ✓ | |
related_identities | RelatedIdentity Object List | Identifies other entity Identities related to this Identity | ✓ |
This entry is required
Identifies other entity Identities related to this Identity
Describes a related Identity
Property | Type | Description | Required? |
---|---|---|---|
identity | String | The reference (URI) of the related Identity object | ✓ |
confidence | HighMedLow String | Specifies the level of confidence in the assertion of the relationship between the two objects | |
information_source | String | Specifies the source of the information about the relationship between the two components | |
relationship | String |
Specifies the level of confidence in the assertion of the relationship between the two objects
This entry is optional
The reference (URI) of the related Identity object
This entry is required
Specifies the source of the information about the relationship between the two components
Property | Type | Description | Required? |
---|---|---|---|
description | String | text (Markdown) description of specific classes or instances of infrastructure utilized for cyber attack | |
short_description | String | ||
title | String | ||
type | AttackerInfrastructure String | represents the type of infrastructure being described |
text (Markdown) description of specific classes or instances of infrastructure utilized for cyber attack
This entry is optional
This entry is optional
This entry is optional
represents the type of infrastructure being described
This entry is optional
Describes a hardware or software tool used
Property | Type | Description | Required? |
---|---|---|---|
description | String | ✓ | |
references | String List | references to instances or additional information for this tool | |
service_pack | String | service pack descriptor for this tool | |
type | AttackToolType String List | type of the tool leveraged | |
vendor | String | information identifying the vendor organization for this tool |
This entry is required
references to instances or additional information for this tool
service pack descriptor for this tool
type of the tool leveraged
This entry is optional
This entry's type is sequential (allows zero or more values)
information identifying the vendor organization for this tool
Property | Type | Description | Required? |
---|---|---|---|
identity | Identity Object | infrastructure observed to have been utilized for cyber attack | |
targeted_information | InformationType String List | a type of information that is targeted | |
targeted_observables | Observable Object List | targeted observables | |
targeted_systems | SystemType String List | type of system that is targeted |
infrastructure observed to have been utilized for cyber attack
a type of information that is targeted
This entry is optional
This entry's type is sequential (allows zero or more values)
targeted observables
type of system that is targeted
This entry is optional
This entry's type is sequential (allows zero or more values)
A simple, atomic value which has a consistent identity, and is stable enough to be attributed an intent or nature. This is the classic 'indicator' which might appear in a data feed of bad IPs, or bad Domains. These do not exist as objects within the CTIA storage model, so you never create an observable.
Property | Type | Description | Required? |
---|---|---|---|
type | ObservableTypeIdentifier String | ✓ | |
value | String | ✓ |
This entry is required
Describes a person or an organization
Property | Type | Description | Required? |
---|---|---|---|
description | String | ✓ | |
related_identities | RelatedIdentity Object List | Identifies other entity Identities related to this Identity | ✓ |
This entry is required
Identifies other entity Identities related to this Identity
Describes a related Identity
Property | Type | Description | Required? |
---|---|---|---|
identity | String | The reference (URI) of the related Identity object | ✓ |
confidence | HighMedLow String | Specifies the level of confidence in the assertion of the relationship between the two objects | |
information_source | String | Specifies the source of the information about the relationship between the two components | |
relationship | String |
Specifies the level of confidence in the assertion of the relationship between the two objects
This entry is optional
The reference (URI) of the related Identity object
This entry is required
Specifies the source of the information about the relationship between the two components
Can you improve this documentation?Edit on GitHub
cljdoc is a website building & hosting documentation for Clojure/Script libraries
× close