All Downloads are FREE. Search and download functionalities are using the official Maven repository.

schemas.v1.2.0.ttp.xsd Maven / Gradle / Ivy

The newest version!


	
		This schema was originally developed by The MITRE Corporation. The STIX XML Schema implementation is maintained by The MITRE Corporation and developed by the open STIX Community. For more information, including how to get involved in the effort and how to submit change requests, please visit the STIX website at http://stix.mitre.org. 
		
			STIX TTP
			1.2
			05/15/2015 9:00:00 AM
			Structured Threat Information eXpression (STIX) - TTP - Schematic implementation for the TTP construct within the STIX structured cyber threat expression language architecture.
			Copyright (c) 2012-2015, The MITRE Corporation. All rights reserved. The contents of this file are subject to the terms of the STIX License located at http://stix.mitre.org/about/termsofuse.html. See the STIX License for the specific language governing permissions and limitations for use of this schema. When distributing copies of the STIX Schema, this license header must be included. 
		
	
	
	
	
	
	
		
			The TTP field characterizes specific details of observed or potential attacker Tactics, Techniques and Procedures.
		
	
	
	
		
			Represents a single STIX TTP.
			TTPs are representations of the behavior or modus operandi of cyber adversaries. It is a term taken from the traditional military sphere and is used to characterize what an adversary does and how they do it in increasing levels of detail. For instance, to give a simple example, a tactic may be to use malware to steal credit card credentials. A related technique (at a lower level of detail) may be to send targeted emails to potential victims, which have documents attached containing malicious code which executes upon opening, captures credit card information from keystrokes, and uses http to communicate with a command and control server to transfer information. A related procedure (at a lower level of detail) may be to perform open source research to identify potentially gullible individuals, craft a convincing socially engineered email and document, create malware/exploit that will bypass current antivirus detection, establish a command and control server by registering a domain called mychasebank.org, and send mail to victims from a Gmail account called [email protected].
			TTPs consist of the specific adversary behavior (attack patterns, malware, exploits) exhibited, resources leveraged (tools, infrastructure, personas), information on the victims targeted (who, what or where), relevant ExploitTargets being targeted, intended effects, relevant kill chain phases, handling guidance, source of the TTP information, etc.
			TTPs play a central role in cyber threat information and cyber threat intelligence. They are relevant for Indicators, Incidents, Campaigns, and ThreatActors. In addition, they hold a close relationship with ExploitTargets that characterize the specific targets that the TTPs seek to exploit.
		
		
			
				
					
						
							The Title field provides a simple title for this TTP.
						
					
					
						
							The Description field is optional and provides an unstructured, text description of this TTP.
						
					
					
						
							The Short_Description field is optional and provides a short, unstructured, text description of this TTP.
						
					
					
						
							The Intended_Effect field specifies the suspected intended effect for this TTP.
							It is implemented through the StatementType, which allows for the expression of a statement in a vocabulary (Value), a description of the statement (Description), a confidence in the statement (Confidence), and the source of the statement (Source). The default vocabulary type for the Value is IntendedEffectVocab-1.0 in the http://stix.mitre.org/default_vocabularies-1 namespace. This type is defined in the stix_default_vocabularies.xsd file or at the URL http://stix.mitre.org/XMLSchema/default_vocabularies/1.2.0/stix_default_vocabularies.xsd.
							Users may also define their own vocabulary using the type extension mechanism, specify a vocabulary name and reference using the attributes, or simply use this as a string field.
						
					
					
						
							Behavior describes the attack patterns, malware, or exploits that the attacker leverages to execute this TTP.
						
					
					
						
							 Resources describe the infrastructure or tools that the adversary uses to execute this TTP. 
						
					
					
						
							The Victim_Targeting field characterizes the people, organizations, information or access being targeted.
						
					
					
						
							The Exploit_Targets field characterizes potential vulnerability, weakness or configuration targets for exploitation by this TTP.
						
					
					
						
							The Related_TTPs field specifies other TTPs asserted to be related to this cyber threat TTP.
						
					
					
						
							The Kill_Chain_Phases field specifies one or more Kill Chain phases associated with this TTP item.
						
					
					
						
							The Information_Source field details the source of this entry.
						
					
					
						
							The Kill_Chains field characterizes specific Kill Chain definitions for reference within specific TTP entries, Indicators and elsewhere.
						
					
					
						
							Specifies the relevant handling guidance for this TTP. The valid marking scope is the nearest TTPBaseType ancestor of this Handling element and all its descendants.
						
					
					
						
							The Related_Packages field identifies or characterizes relationships to set of related Packages.
							DEPRECATED: This field is deprecated and will be removed in the next major version of STIX. Its use is strongly discouraged except for legacy applications.
							
								true
							
						
					
				
				
					
						Specifies the relevant STIX-TTP schema version for this content.
					
				
			
		
	
	
	
		
			An enumeration of all versions of the TTP type valid in the current release of STIX.
		
		
			
			
			
			
			
		
	
	
		
			Captures prose information about an individual attack pattern as well as a CAPEC reference.
			In addition to capturing basic information, this type is intended to be extended to enable the structured description of an attack pattern instance using the XML Schema extension feature. The STIX default extension uses the Common Attack Pattern Enumeration and Classification (CAPEC) schema to do so. The extension that defines this is captured in the CAPEC2.7InstanceType in the http://stix.mitre.org/extensions/AP#CAPEC2.7-1 namespace. This type is defined in the extensions/attack_pattern/capec_2.7_attack_pattern.xsd file or at the URL http://stix.mitre.org/XMLSchema/extensions/attack_pattern/capec_2.7/1.0.1/capec_2.7_attack_pattern.xsd.
		
		
			
				
					The Title field provides a simple title for an individual Attack Pattern.
				
			
			
				
					The Description field is optional and provides an unstructured, text description of an individual Attack Pattern.
				
			
			
				
					The Short_Description field is optional and provides a short, unstructured, text description of an individual Attack Pattern.
				
			
		
		
			
				Specifies a unique ID for this Attack Pattern.
			
		
		
			
				Specifies a reference to the ID for this Attack Pattern specified elsewhere.
			
		
		
			
				This field specifies a reference to a particular entry within the Common Attack Pattern Enumeration and Classification (CAPEC)
			
			
				
					
				
			
		
	
	
		
			Captures basic information about an individual malware instance.
			In addition to capturing basic information, this type is intended to be extended to enable the structured description of a malware instance using the XML Schema extension feature. The STIX default extension uses the Malware Attribute Enumeration and Classification (MAEC) schema to do so. The extension that defines this is captured in the MAEC4.1InstanceType in the http://stix.mitre.org/extensions/Malware#MAEC4.1-1 namespace. This type is defined in the extensions/malware/maec_4.1_malware.xsd file or at the URL http://stix.mitre.org/XMLSchema/extensions/malware/maec_4.1/1.0/maec_4.1_malware.xsd.
		
		
			
				
					The Type field provides a characterization of what type of malware this MalwareInstance is.
					This field is implemented through the xsi:type controlled vocabulary extension mechanism. The default vocabulary type is MalwareTypeVocab-1.0 in the http://stix.mitre.org/default_vocabularies-1 namespace. This type is defined in the stix_default_vocabularies.xsd file or at the URL http://stix.mitre.org/XMLSchema/default_vocabularies/1.2.0/stix_default_vocabularies.xsd.
					Users may also define their own vocabulary using the type extension mechanism, specify a vocabulary name and reference using the attributes, or simply use this as a string field.
				
			
			
				
					The Name field specifies a name associated with this MalwareInstance.
					This field is implemented through the xsi:type controlled vocabulary extension mechanism. No default vocabulary type has been defined for STIX 1.2. Users may either define their own vocabulary using the type extension mechanism, specify a vocabulary name and reference using the attributes, or simply use this as a free string field.
				
			
			
				
					The Title field is optional and provides an unstructured, text description of an individual Malware Instance.
				
			
			
				
					The Description field provides an text description of an individual Malware Instance.
				
			
			
				
					The Short_Description field provides a short text description of an individual Malware Instance.
				
			
		
		
			
				Specifies a unique ID for this Malware Instance.
			
		
		
			
				Specifies a reference to the ID for this Malware Instance specified elsewhere.
			
		
	
	
		
			Characterizes a description of an individual exploit.
			In addition to capturing basic information, this type is intended to be extended to enable the structured description of an exploit using the XML Schema extension feature. No extension is provided by STIX to support this, however those wishing to represent structured exploit information may develop such an extension.
		
		
			
				
					The Title field provides a simple title for an individual Exploit instance.
				
			
			
				
					The Description field is optional and provides an unstructured, text description of an individual Exploit Instance.
				
			
			
				
					The Short_Description field is optional and provides a short, unstructured, text description of an individual Exploit Instance.
				
			
		
		
			
				Specifies a unique ID for this Exploit Instance.
			
		
		
			
				Specifies a reference to the ID for this Exploit Instance specified elsewhere.
			
		
	
	
		
			
				
					
						
							The Related_TTP field specifies a single other TTP asserted to be related to this cyber threat TTP.
						
					
				
			
		
	
	
		
			
				
					The Title field provides a simple title for a class or instance of Infrastructure utilized for cyber attack.
				
			
			
				
					The Type field represents the type of infrastructure being described.
					This field is implemented through the xsi:type controlled vocabulary extension mechanism. The default vocabulary type is AttackerInfrastructureTypeVocab-1.0 in the http://stix.mitre.org/default_vocabularies-1 namespace. This type is defined in the stix_default_vocabularies.xsd file or at the URL http://stix.mitre.org/XMLSchema/default_vocabularies/1.2.0/stix_default_vocabularies.xsd.
					Users may also define their own vocabulary using the type extension mechanism, specify a vocabulary name and reference using the attributes, or simply use this as a string field.
				
			
			
				
					The Description field is optional and provides an unstructured, text description of specific classes or instances of infrastructure utilized for cyber attack.
				
			
			
				
					The Short_Description field is optional and provides a short, unstructured, text description of specific classes or instances of infrastructure utilized for cyber attack.
				
			
			
				
					The Observable_Characterization field provides structured characterization of the cyber observables detailing specific classes or instances of infrastructure utilized for cyber attack.
				
			
		
		
			
				Specifies a unique ID for this class or instance of Infrastructure.
			
		
		
			
				Specifies a reference to the ID for this class or instance of Infrastructure specified elsewhere.
			
		
	
	
		
			
				
					The Tool field specifies a single Tool leveraged by this TTP item.
					The Type field under this field is implemented through the xsi:type controlled vocabulary extension mechanism. The default vocabulary type is AttackerToolTypeVocab-1.0 in the http://stix.mitre.org/default_vocabularies-1 namespace. This type is defined in the stix_default_vocabularies.xsd file or at the URL http://stix.mitre.org/XMLSchema/default_vocabularies/1.2.0/stix_default_vocabularies.xsd.
					Users may also define their own vocabulary using the type extension mechanism, specify a vocabulary name and reference using the attributes, or simply use this as a string field.
				
			
		
	
	
		
			
				
					The Exploit field specifies a single Exploit for this TTP item.
				
			
		
	
	
		
			
				
					
						
							The Exploit_Target field characterizes potential vulnerability, weakness or configuration targets for exploitation by this TTP.
						
					
				
			
		
	
	
		
			
				
					The Malware_Instance field specifies a single instance of Malware for this TTP item.
				
			
		
	
	
		
			
				
					The Attack_Pattern field specifies a single Attack Pattern for this TTP item.
				
			
		
	
	
		
			
				
					The Tools field specifies one or more Tools leveraged by this TTP item.
				
			
			
				
					The Infrastructure field characterizes specific classes or instances of infrastructure observed to have been utilized for cyber attack.
				
			
			
				
					The Personas field characterizes specific classes or instances of personas (identities) leveraged by a threat to masquerade as other parties.
				
			
		
	
	
		
			
				
					The Attack_Patterns field specifies one or more Attack Patterns for this TTP item.
				
			
			
				
					The Malware field specifies one or more instances of Malware for this TTP item.
				
			
			
				
					The Exploits field specifies one or more Exploits for this TTP item.
				
			
		
	
	
		
			
				
					The Identity field characterizes information about the identity or characteristics of the targeted people or organizations.
					This field is implemented through the xsi:type extension mechanism. The default type is CIQIdentity3.0InstanceType in the http://stix.mitre.org/extensions/Identity#CIQIdentity3.0-1 namespace. This type is defined in the extensions/identity/ciq_identity_3.0.xsd file or at the URL http://stix.mitre.org/XMLSchema/extensions/identity/ciq_identity_3.0/1.1/ciq_identity_3.0.xsd.
				
			
			
				
					The Targeted_Systems field characterizes a type of system that is targeted. It may be included multiple times to specify multiple types of targeted systems.
					This field is implemented through the xsi:type controlled vocabulary extension mechanism. The default vocabulary type is SystemTypeVocab-1.0 in the http://stix.mitre.org/default_vocabularies-1 namespace. This type is defined in the stix_default_vocabularies.xsd file or at the URL http://stix.mitre.org/XMLSchema/default_vocabularies/1.2.0/stix_default_vocabularies.xsd.
					Users may also define their own vocabulary using the type extension mechanism, specify a vocabulary name and reference using the attributes, or simply use this as a string field.
				
			
			
				
					The Targeted_Systems field characterizes a type of information that is targeted. It may be included multiple times to specify multiple types of targeted information.
					This field is implemented through the xsi:type controlled vocabulary extension mechanism. The default vocabulary type is InformationTypeVocab-1.0 in the http://stix.mitre.org/default_vocabularies-1 namespace. This type is defined in the stix_default_vocabularies.xsd file or at the URL http://stix.mitre.org/XMLSchema/default_vocabularies/1.2.0/stix_default_vocabularies.xsd.
					Users may also define their own vocabulary using the type extension mechanism, specify a vocabulary name and reference using the attributes, or simply use this as a string field.
				
			
			
				
					The Targeted_Technical_Details field characterizes the technical information about what is targeted. It is implemented using the CybOX observables type, which allows for the representation of products, platforms, and code that are targeted.
				
			
		
	
	
		
			
				
					The persona field characterizes a single persona (identity) leveraged by a threat to masquerade as another party.
				
			
		
	





© 2015 - 2024 Weber Informatics LLC | Privacy Policy