Malware Malware is a type of TTP that is also known as malicious code and malicious software, and refers to a program that is inserted into a system, usually covertly, with the intent of compromising the confidentiality, integrity, or availability of the victim's data, applications, or operating system (OS) or of otherwise annoying or disrupting the victim. Malware such as viruses and worms are usually designed to perform these nefarious functions in such a way that users are unaware of them, at least initially.
Property | Type | Description | Required? |
---|---|---|---|
description | MarkdownString | A description of object, which may be detailed. | ✓ |
id | String | Globally unique URI identifying this object. | ✓ |
labels | MalwareLabelString List | The type of malware being described. | ✓ |
schema_version | String | CTIM schema version for this entity | ✓ |
short_description | MedStringString | A single line, short summary of the object. | ✓ |
title | ShortStringString | A short title for this object, used as primary display and reference value | ✓ |
type | MalwareTypeIdentifierString | ✓ | |
abstraction_level | MalwareAbstractionsString | Malware abstraction level | |
external_ids | String List | ||
external_references | ExternalReference Object List | Specifies a list of external references which refers to non-CTIM information. This property is used to provide one or more URLs, descriptions, or IDs to records in other systems. | |
kill_chain_phases | KillChainPhase Object List | The list of Kill Chain Phases for which this Malware can be used. | |
language | ShortStringString | The human language this object is specified in. | |
revision | Integer | A monotonically increasing revision, incremented each time the object is changed. | |
source | MedStringString | ||
source_uri | String | ||
timestamp | Inst (Date) | The time this object was created at, or last modified. | |
tlp | TLPString | Specification for how, and to whom, this object can be shared. | |
x_mitre_aliases | ShortStringString List | ATT&CK Software.aliases |
- Reference: Malware
Malware abstraction level
-
This entry is optional
- MalwareAbstractions Malware Abstraction level
- Allowed Values:
- family
- variant
- version
A description of object, which may be detailed.
-
This entry is required
- Markdown Markdown string with at most 5000 characters
- This entry is optional
- This entry's type is sequential (allows zero or more values)
Specifies a list of external references which refers to non-CTIM information. This property is used to provide one or more URLs, descriptions, or IDs to records in other systems.
- This entry is optional
- This entry's type is sequential (allows zero or more values)
- ExternalReference Object Value
- Details: ExternalReference Object
Globally unique URI identifying this object.
-
This entry is required
- IDs are URIs, for example
https://www.domain.com/ctia/judgement/judgement-de305d54-75b4-431b-adb2-eb6b9e546014
for a Judgement. This ID type compares to the STIX id field. The optional STIX idref field is not used.
- IDs are URIs, for example
The list of Kill Chain Phases for which this Malware can be used.
- This entry is optional
- This entry's type is sequential (allows zero or more values)
- KillChainPhase Object Value
- Details: KillChainPhase Object
The type of malware being described.
-
This entry is required
-
This entry's type is sequential (allows zero or more values)
- MalwareLabel Malware label is an open vocabulary that represents different types and functions of malware. Malware labels are not mutually exclusive; a malware instance can be both spyware and a screen capture tool.
- Allowed Values:
- adware
- backdoor
- bot
- ddos
- dropper
- exploit-kit
- keylogger
- ransomware
- remote-access-trojan
- resource-exploitation
- rogue-security-software
- rootkit
- screen-capture
- spyware
- trojan
- virus
- worm
- Reference: Malware Label
The human language this object is specified in.
-
This entry is optional
- ShortString String with at most 1024 characters
A monotonically increasing revision, incremented each time the object is changed.
-
This entry is optional
- Zero, or a positive integer
CTIM schema version for this entity
-
This entry is required
- A semantic version matching the CTIM version against which this object should be valid.
A single line, short summary of the object.
-
This entry is required
- MedString String with at most 2048 characters
-
This entry is optional
- MedString String with at most 2048 characters
-
This entry is optional
- A URI
The time this object was created at, or last modified.
-
This entry is optional
- ISO8601 Timestamp Schema definition for all date or timestamp values. Serialized as a string, the field should follow the rules of the ISO8601 standard.
A short title for this object, used as primary display and reference value
-
This entry is required
- ShortString String with at most 1024 characters
Specification for how, and to whom, this object can be shared.
-
This entry is optional
- TLP TLP stands for Traffic Light Protocol, which indicates precisely how this resource is intended to be shared, replicated, copied, etc.
- Default: green
- Allowed Values:
- amber
- green
- red
- white
-
This entry is required
- Must equal: "malware"
ATT&CK Software.aliases
-
This entry is optional
-
This entry's type is sequential (allows zero or more values)
- ShortString String with at most 1024 characters
ExternalReference External references are used to describe pointers to information represented outside of CTIM. For example, a Malware object could use an external reference to indicate an ID for that malware in an external database or a report could use references to represent source material.
Property | Type | Description | Required? |
---|---|---|---|
source_name | MedStringString | The source within which the external-reference is defined (system, registry, organization, etc.) | ✓ |
description | MarkdownString | ||
external_id | String | An identifier for the external reference content. | |
hashes | String List | Specifies a dictionary of hashes for the contents of the url. | |
url | String | A URL reference to an external resource |
- Reference: External Reference
-
This entry is optional
- Markdown Markdown string with at most 5000 characters
An identifier for the external reference content.
- This entry is optional
Specifies a dictionary of hashes for the contents of the url.
- This entry is optional
- This entry's type is sequential (allows zero or more values)
The source within which the external-reference is defined (system, registry, organization, etc.)
-
This entry is required
- MedString String with at most 2048 characters
A URL reference to an external resource
-
This entry is optional
- A URI
KillChainPhase The kill-chain-phase represents a phase in a kill chain, which describes the various phases an attacker may undertake in order to achieve their objectives.
Property | Type | Description | Required? |
---|---|---|---|
kill_chain_name | String | The name of the kill chain. | ✓ |
phase_name | String | The name of the phase in the kill chain. | ✓ |
- Reference: Kill Chain Phase
The name of the kill chain.
-
This entry is required
- SHOULD be all lowercase (where lowercase is defined by the locality conventions) and SHOULD use hyphens instead of spaces or underscores as word separators.
- Must equal: "lockheed-martin-cyber-kill-chain"
- Reference: Open Vocabulary
The name of the phase in the kill chain.
-
This entry is required
- SHOULD be all lowercase (where lowercase is defined by the locality conventions) and SHOULD use hyphens instead of spaces or underscores as word separators.
- Allowed Values:
- actions-on-objective
- command-and-control
- delivery
- exploitation
- installation
- reconnaissance
- weaponization
- Reference: Open Vocabulary