About
Structured Threat Information Expression (STIX™) is JSON schema and vocabulary for communicating cyber threat intelligence (CTI), such as attacks, malware, threat actors, and mitigations. The STIX specification is managed by OASIS. |
|
|
Example Attack Pattern
{
"type": "attack-pattern",
"id": "attack-pattern--183dcab1-9bd1-4973-aede-0e2ab0183d11",
"name": "Example Attack",
"description": "An example 'technique' or attack.",
"x_mitre_detection": "A short description of how the attack can be detected.",
"created_by_ref": "identity--b9e8b9fd-6d27-472b-bfee-3f6501edf3e9",
"created": "2017-12-14T16:46:06.044Z",
"modified": "2019-06-13T14:49:56.024Z",
"kill_chain_phases": [
{
"kill_chain_name": "example-kill-chain",
"phase_name": "initial-access"
}
],
"x_mitre_version": "1.0",
"external_references": [
{
"external_id": "ID123",
"source_name": "example-attack",
"url": "https://example.org/attack/ID123"
}
]
}
|
|
|
Object Types
Attack Pattern |
A type of Tactics, Techniques, and Procedures (TTP) that describes ways threat actors attempt to compromise targets. |
Campaign |
A grouping of adversarial behaviors that describes a set of malicious activities or attacks that occur over a period of time against a specific set of targets. |
Course of Action |
An action taken to either prevent an attack or respond to an attack. |
Identity |
Individuals, organizations, or groups, as well as classes of individuals, organizations, or groups. |
Indicator |
Contains a pattern that can be used to detect suspicious or malicious cyber activity. |
Intrusion Set |
A grouped set of adversarial behaviors and resources with common properties believed to be orchestrated by a single threat actor. |
Malware |
A type of TTP, also known as malicious code and malicious software, used to compromise the confidentiality, integrity, or availability of a victim’s data or system. |
Observed Data |
Conveys information observed on a system or network (e.g., an IP address). |
Report |
Collections of threat intelligence focused on one or more topics, such as a description of a threat actor, malware, or attack technique, including contextual details. |
Threat Actor |
Individuals, groups, or organizations believed to be operating with malicious intent. |
Tool |
Legitimate software that can be used by threat actors to perform attacks. |
Vulnerability |
A mistake in software that can be directly used by a hacker to gain access to a system or network. |
Relationship |
Used to link two SDOs and to describe how they are related to each other. |
Sighting |
Denotes the belief that an element of CTI was seen (e.g., indicator, malware). |
|