threatgrid/ctim
1.3.20
cljdoc
ereteog/ctim
Liking cljdoc? Tell your friends :D
Articles
Readme
Cisco Threat Intel Model (CTIM)
Common Relationship Type
Sorting CTIM Entities
*Actor* Object
*Asset* Object
*AssetMapping* Object
*AssetProperties* Object
*AttackPattern* Object
*Bundle* Object
*Campaign* Object
*Casebook* Object
*COA* Object
*Feedback* Object
*Incident* Object
*Indicator* Object
*Judgement* Object
*Malware* Object
*Note* Object
*Relationship* Object
*Sighting* Object
*TargetRecord* Object
*Tool* Object
*Verdict* Object
*Vulnerability* Object
*Weakness* Object
How to Build an Excellent External ID
SecureX Incident Summary Guidelines
Modeling Complex Events in CTIM
Modeling Incidents in CTIM
Modeling Threat Intelligence in CTIM
Namespaces
ctim
document
domain
disposition
id
observables
ip
sorting
time
validity
examples
actors
asset-mappings
asset-properties
assets
attack-patterns
bundles
campaigns
casebooks
coas
data-tables
feedbacks
identity-assertions
incidents
indicators
investigations
judgements
malwares
notes
relationships
sightings
target-records
tools
verdicts
vulnerabilities
weaknesses
generate
generators
common
entities
id
lib
generators
predicates
schema
schemas
actor
asset
asset-mapping
asset-properties
attack-pattern
bundle
campaign
casebook
coa
common
data-table
feedback
identity-assertion
incident
indicator
investigation
judgement
malware
note
openc2-network
openc2-network-sdn
openc2vocabularies
relationship
sighting
context
target-record
tool
verdict
vocabularies
vulnerability
weakness
All platforms.
architecture-classes
ArchitectureClass
attack-pattern-abstraction-labels
AttackPatternAbstractions
campaign-status
CampaignStatus
COA-stage
COA-type
COAStage
COAType
consequence-scopes
ConsequenceScope
cvss-v2-access-complexities
cvss-v2-access-vectors
cvss-v2-authentications
cvss-v2-cdp-scores
cvss-v2-exploitability-scores
cvss-v2-impacts
cvss-v2-remediation-level-scores
cvss-v2-report-confidence-scores
cvss-v2-security-requirement-scores
cvss-v2-target-distribution-scores
cvss-v3-attack-complexities
cvss-v3-attack-vectors
cvss-v3-availability-impacts
cvss-v3-confidentiality-impacts
cvss-v3-exploit-code-maturities
cvss-v3-integrity-impacts
cvss-v3-modified-attack-complexities
cvss-v3-modified-attack-vectors
cvss-v3-modified-availability-impacts
cvss-v3-modified-confidentiality-impacts
cvss-v3-modified-integrity-impacts
cvss-v3-modified-privileges-required
cvss-v3-modified-scopes
cvss-v3-modified-user-interactions
cvss-v3-privileges-required
cvss-v3-remediation-levels
cvss-v3-report-confidences
cvss-v3-scopes
cvss-v3-security-requirements
cvss-v3-severities
CVSSv2AccessComplexity
CVSSv2AccessVector
CVSSv2Authentication
CVSSv2AvailabilityImpact
CVSSv2CollateralDamagePotential
CVSSv2ConfidentialityImpact
CVSSv2Exploitability
CVSSv2IntegrityImpact
CVSSv2RemediationLevel
CVSSv2ReportConfidence
CVSSv2SecurityRequirement
CVSSv2TargetDistribution
CVSSv3AttackComplexity
CVSSv3AttackVector
CVSSv3AvailabilityImpact
CVSSv3ConfidentialityImpact
CVSSv3ExploitCodeMaturity
CVSSv3IntegrityImpact
CVSSv3ModifiedAttackComplexity
CVSSv3ModifiedAttackVector
CVSSv3ModifiedAvailabilityImpact
CVSSv3ModifiedConfidentialityImpact
CVSSv3ModifiedIntegrityImpact
CVSSv3ModifiedPrivilegesRequired
CVSSv3ModifiedScope
CVSSv3ModifiedUserInteraction
CVSSv3PrivilegesRequired
CVSSv3RemediationLevel
CVSSv3ReportConfidence
CVSSv3Scope
CVSSv3SecurityRequirements
CVSSv3Severity
CVSSv3UserInteraction
default-resolution
detection-effectivness
detection-methods
DetectionEffectiveness
DetectionMethod
discovery-method
DiscoveryMethod
Effectiveness
effectiveness
functional-areas
FunctionalArea
high-med-low
HighMedLow
incident-category
IncidentCategory
indicator-type
IndicatorType
intended-effect
IntendedEffect
kill-chain-name
kill-chain-phases
language-classes
LanguageClass
location-class
LocationClass
loss-duration
loss-property
LossDuration
LossProperty
malware-abstraction-labels
malware-labels
MalwareAbstractions
MalwareLabel
mitigation-strategies
MitigationStrategy
Motivation
motivation
note-types
NoteType
observable-type-identifier
ObservableTypeIdentifier
operating-system-classes
OperatingSystemClass
Prevalence
prevalences
promotion-method
PromotionMethod
relationship-type
RelationshipType
Resolution
resolution
scope
Scope
sensor
Sensor
Severity
severity
software-phases
SoftwarePhase
sophistication
Sophistication
Status
status
system-resources
SystemResource
technical-impacts
TechnicalImpact
threat-actor-type
ThreatActorType
tool-labels
ToolLabel
user-interactions
weakness-abstraction-levels
weakness-structures
WeaknessAbstractionLevel
WeaknessStructure
ctim.schemas.vocabularies
architecture-classes
clj/s
source
ArchitectureClass
clj/s
source
attack-pattern-abstraction-labels
clj/s
source
AttackPatternAbstractions
clj/s
source
campaign-status
clj/s
source
CampaignStatus
clj/s
source
COA-stage
clj/s
source
COA-type
clj/s
source
COAStage
clj/s
source
COAType
clj/s
source
consequence-scopes
clj/s
source
ConsequenceScope
clj/s
source
cvss-v2-access-complexities
clj/s
source
cvss-v2-access-vectors
clj/s
source
cvss-v2-authentications
clj/s
source
cvss-v2-cdp-scores
clj/s
source
cvss-v2-exploitability-scores
clj/s
source
cvss-v2-impacts
clj/s
source
cvss-v2-remediation-level-scores
clj/s
source
cvss-v2-report-confidence-scores
clj/s
source
cvss-v2-security-requirement-scores
clj/s
source
cvss-v2-target-distribution-scores
clj/s
source
cvss-v3-attack-complexities
clj/s
source
cvss-v3-attack-vectors
clj/s
source
cvss-v3-availability-impacts
clj/s
source
cvss-v3-confidentiality-impacts
clj/s
source
cvss-v3-exploit-code-maturities
clj/s
source
cvss-v3-integrity-impacts
clj/s
source
cvss-v3-modified-attack-complexities
clj/s
source
cvss-v3-modified-attack-vectors
clj/s
source
cvss-v3-modified-availability-impacts
clj/s
source
cvss-v3-modified-confidentiality-impacts
clj/s
source
cvss-v3-modified-integrity-impacts
clj/s
source
cvss-v3-modified-privileges-required
clj/s
source
cvss-v3-modified-scopes
clj/s
source
cvss-v3-modified-user-interactions
clj/s
source
cvss-v3-privileges-required
clj/s
source
cvss-v3-remediation-levels
clj/s
source
cvss-v3-report-confidences
clj/s
source
cvss-v3-scopes
clj/s
source
cvss-v3-security-requirements
clj/s
source
cvss-v3-severities
clj/s
source
CVSSv2AccessComplexity
clj/s
source
CVSSv2AccessVector
clj/s
source
CVSSv2Authentication
clj/s
source
CVSSv2AvailabilityImpact
clj/s
source
CVSSv2CollateralDamagePotential
clj/s
source
CVSSv2ConfidentialityImpact
clj/s
source
CVSSv2Exploitability
clj/s
source
CVSSv2IntegrityImpact
clj/s
source
CVSSv2RemediationLevel
clj/s
source
CVSSv2ReportConfidence
clj/s
source
CVSSv2SecurityRequirement
clj/s
source
CVSSv2TargetDistribution
clj/s
source
CVSSv3AttackComplexity
clj/s
source
CVSSv3AttackVector
clj/s
source
CVSSv3AvailabilityImpact
clj/s
source
CVSSv3ConfidentialityImpact
clj/s
source
CVSSv3ExploitCodeMaturity
clj/s
source
CVSSv3IntegrityImpact
clj/s
source
CVSSv3ModifiedAttackComplexity
clj/s
source
CVSSv3ModifiedAttackVector
clj/s
source
CVSSv3ModifiedAvailabilityImpact
clj/s
source
CVSSv3ModifiedConfidentialityImpact
clj/s
source
CVSSv3ModifiedIntegrityImpact
clj/s
source
CVSSv3ModifiedPrivilegesRequired
clj/s
source
CVSSv3ModifiedScope
clj/s
source
CVSSv3ModifiedUserInteraction
clj/s
source
CVSSv3PrivilegesRequired
clj/s
source
CVSSv3RemediationLevel
clj/s
source
CVSSv3ReportConfidence
clj/s
source
CVSSv3Scope
clj/s
source
CVSSv3SecurityRequirements
clj/s
source
CVSSv3Severity
clj/s
source
CVSSv3UserInteraction
clj/s
source
default-resolution
clj/s
source
detection-effectivness
clj/s
source
detection-methods
clj/s
source
DetectionEffectiveness
clj/s
source
DetectionMethod
clj/s
source
discovery-method
clj/s
source
DiscoveryMethod
clj/s
source
Effectiveness
clj/s
source
effectiveness
clj/s
source
functional-areas
clj/s
source
FunctionalArea
clj/s
source
high-med-low
clj/s
source
HighMedLow
clj/s
source
incident-category
clj/s
source
IncidentCategory
clj/s
source
indicator-type
clj/s
source
IndicatorType
clj/s
source
intended-effect
clj/s
source
IntendedEffect
clj/s
source
kill-chain-name
clj/s
source
kill-chain-phases
clj/s
source
language-classes
clj/s
source
LanguageClass
clj/s
source
location-class
clj/s
source
LocationClass
clj/s
source
loss-duration
clj/s
source
loss-property
clj/s
source
LossDuration
clj/s
source
LossProperty
clj/s
source
malware-abstraction-labels
clj/s
source
malware-labels
clj/s
source
MalwareAbstractions
clj/s
source
MalwareLabel
clj/s
source
mitigation-strategies
clj/s
source
MitigationStrategy
clj/s
source
Motivation
clj/s
source
motivation
clj/s
source
note-types
clj/s
source
NoteType
clj/s
source
observable-type-identifier
clj/s
source
ObservableTypeIdentifier
clj/s
source
operating-system-classes
clj/s
source
OperatingSystemClass
clj/s
source
Prevalence
clj/s
source
prevalences
clj/s
source
promotion-method
clj/s
source
PromotionMethod
clj/s
source
relationship-type
clj/s
source
RelationshipType
clj/s
source
Resolution
clj/s
source
resolution
clj/s
source
scope
clj/s
source
Scope
clj/s
source
sensor
clj/s
source
Sensor
clj/s
source
Severity
clj/s
source
severity
clj/s
source
software-phases
clj/s
source
SoftwarePhase
clj/s
source
sophistication
clj/s
source
Sophistication
clj/s
source
Status
clj/s
source
status
clj/s
source
system-resources
clj/s
source
SystemResource
clj/s
source
technical-impacts
clj/s
source
TechnicalImpact
clj/s
source
threat-actor-type
clj/s
source
ThreatActorType
clj/s
source
tool-labels
clj/s
source
ToolLabel
clj/s
source
user-interactions
clj/s
source
weakness-abstraction-levels
clj/s
source
weakness-structures
clj/s
source
WeaknessAbstractionLevel
clj/s
source
WeaknessStructure
clj/s
source
cljdoc
is a website building & hosting documentation for Clojure/Script libraries
Keyboard shortcuts
Report a problem
cljdoc on GitHub
× close