TTPType characterizes an individual adversary TTP.
Specifies a globally unique identifier for this TTP item.
Specifies a globally unique identifier of a TTP item specified elsewhere.
When idref is specified, the id attribute must not be specified, and any instance of this TTP item should not hold content.
Specifies a timestamp for the definition of a specific version of a TTP item. When used in conjunction with the id, this field is specifying the definition time for the specific version of the TTP item. When used in conjunction with the idref, this field is specifying a reference to a specific version of a TTP item defined elsewhere. This field has no defined semantic meaning if used in the absence of either the id or idref fields.
This field must only be used in conjunction with the idref field.
Specifies the relevant STIX-TTP schema version for this content.
The Title field provides a simple title for this TTP.
The Description field is optional and provides an unstructured, text description of this TTP.
The Short_Description field is optional and provides a short, unstructured, text description of this TTP.
The Intended_Effect field specifies the suspected intended effect for this TTP.
It is implemented through the StatementType, which allows for the expression of a statement in a vocabulary (Value), a description of the statement (Description), a confidence in the statement (Confidence), and the source of the statement (Source). The default vocabulary type for the Value is IntendedEffectVocab-1.0 in the http://stix.mitre.org/default_vocabularies-1 namespace. This type is defined in the stix_default_vocabularies.xsd file or at the URL http://stix.mitre.org/XMLSchema/default_vocabularies/1.1.0/stix_default_vocabularies.xsd.
Users may also define their own vocabulary using the type extension mechanism, specify a vocabulary name and reference using the attributes, or simply use this as a string field.
Behavior describes the attack patterns, malware, or exploits that the attacker leverages to execute this TTP.
Resources describe the infrastructure or tools that the adversary uses to execute this TTP.
The Victim_Targeting field characterizes the people, organizations, information or access being targeted.
The Exploit_Targets field characterizes potential vulnerability, weakness or configuration targets for exploitation by this TTP.
The Related_TTPs field specifies other TTPs asserted to be related to this cyber threat TTP.
The Kill_Chain_Phases field specifies one or more Kill Chain phases associated with this TTP item.
The Information_Source field details the source of this entry.
The Kill_Chains field characterizes specific Kill Chain definitions for reference within specific TTP entries, Indicators and elsewhere.
Specifies the relevant handling guidance for this TTP. The valid marking scope is the nearest TTPBaseType ancestor of this Handling element and all its descendants.
The Related_Packages field identifies or characterizes relationships to set of related Packages.