Current ThreatQ Version Filter
 

STIX 2.0 Data Mapping

Although the ThreatQ STIX parser does not support version 2.1, it will parse 2.1 files in the same manner as 2.0 files. As such, it does not parse out any object types introduced in STIX 2.1, except for Notes objects.

You can click on the expand icon located to the top-right of this topic to expand and collapse all mapping tables below.

  • Attack Patterns MappingAttack Patterns Mapping
    STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
    created Attack Pattern.Published_at  
    description Attack Pattern.Attribute Description
    external_references[] See External References  
    kill_chain_phases.[]e See Kill Chain Table  
    modified Attack Pattern.Attribute Modified At
    name Attack Pattern.Value  
    revoked (if revoked == true) Attack Pattern.Attribute Revoked
    labels Attack Pattern.Attribute Label
  • Threat Actors MappingThreat Actors Mapping
    STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
    aliases Adversary * The Adversary created will have all the same attributes and published_at as the base Attribute. All alias Adversaries will be inter-related
    created Adversary.Published_At  
    goals Adversary.Attribute Goal
    labels Adversary.Attribute Label
    modified Adversary.Attribute Modified At
    name Adversary.Value  
    primary_motivation Adversary.Attribute Primary Motivation
    resource_level Adversary.Attribute Resource Level
    roles Adversary.Attribute Role
    secondary_motivation Adversary.Attribute Secondary Motivation
    sophistication Adversary.Attribute Sophistication
    revoked
    (if revoked == true)
    Adversary.Attribute Revoked
    external_references[] See External References  
    personal_motivations Adversary.Attribute Personal Motivation
  • Indicators MappingIndicators Mapping
    STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
    created Signature.Published_at  
    description Signature.Description  
    external_references[] See External References  
    labels Signature.Attribute Label
    modified Signature.Attribute Modified At
    name Signature.Name ThreatQ will default to using Indicator Pattern as the signature name if a name is not provided.
    pattern Signature.Value  
      Signature.Type Indicator Pattern
    valid.from Signature.Attribute Valid From
    valid.until Signature.Attribute Valid Until
    revoked (if revoked == true) Signature.Attribute Revoked
    kill_chain_phases.[] See Kill Chain Table  

    ThreatQ Indicator and / or Event objects based on the Observables Mapping may be derived from the pattern field and related back to the resulting Signature.

  • Identities MappingIdentities Mapping
    STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
    contact_information Identity.Contact_Information  
    created Identity.Published_at  
    description Identity.Description  
    external_references[] See External References  
    identity_class Identity.Attribute Identity Class
    modified Identity.Attribute Modified At
    name Identity.Value  
    sectors Identity.Attribute Sector
    labels Identity.Attribute Label
    revoked (if revoked == true) Identity.Attribute Revoked
  • Observables MappingObservables Mapping
    STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
    created Observable.Published_at  
    modified Observable.Attribute Modified At
    revoked (if revoked == true) Observable.Attribute Revoked
    external_references Observable.Attribute External Reference
    See External References.
    number_observed Observable.Attribute Number Observed
    objects[]   Specifies Cyber Observable Objects representing this observation. See the tables below for parsing details.
    1. Artifact MappingArtifact Mapping
      STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
      type: artifact Indicator.Type URL
      mime_type Indicator.Attribute MIME Type
      url Indicator.Value  
      hashes{} Indicator.relationship  
      hashes{}.key Indicator.Type MD5 / SHA-1 / SHA-256 / SHA-384 / SHA-512 / Fuzzy Hash
      hashes{}.value Indicator.Value  
    2. Automous System MappingAutomous System Mapping
      STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
      type: autonomous-system Indicator.Type ASN
      number Indicator.Value  
      name Indicator.Attribute Name
      rir Indicator.Attribute Regional Internet Registry
    3. Directory MappingDirectory Mapping
      STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
      type: directory Indicator.Type File Path
      path Indicator.Value  
      path_enc Indicator.Attribute Path Encoding
      created Indicator.Attribute Created At
      accessed Indicator.Attribute Last Accessed
      contains_refs Indicator.relationship  
    4. Domain-Name MappingDomain-Name Mapping
      STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
      type: domain-name Indicator.Type FQDN
      value Indicator.Value  
      resolves_to_refs[] Indicator.relationship  
    5. Email Addr MappingEmail Addr Mapping
      STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
      type: email-addr Indicator.Type Email Address
      display_name Indicator.Attribute Display Name
      value Indicator.Value  
      belongs_to_ref[] Indicator.relationship  
    6. Email Message MappingEmail Message Mapping
      STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
      type: email-message Event.Type
      Indicator.Type
      Spearphish
      Email Subject
      subject** Event.Title
      Indicator.Value
       
      is_multipart Indicator.Attribute Is Multipart
      date (if parsing as an event)*
      sent date (if parsing as an indicator)
      Event.happened_at
      Indicator.Attribute
       
      content_type Indicator.Attribute Content Type
      from_ref Event.Relationship
      Indicator.Relationship
      From
      sender_ref Event.Relationship
      Indicator.Relationship
      Sender
      to_refs Event.Relationship
      Indicator.Relationship
      To
      cc_refs Event.Relationship CC
      bcc_refs Event.Relationship
      Indicator.Relationship
      BCC
      received_lines Event.Attribute
      Indicator.Attribute
      Received Lines
      additional_header_fields Event.Attribute
      Indicator.Attribute
      Additional Header - {key}

      An attribute is created for each key-value pair of the additional_header_fields object.

      body Event.Attribute
      Indicator.Attribute
      Body
      body_multipart[].body_raw_ref*** Indicator Filename
      raw_email_ref Event.Relationship
      Indicator.Relationship
       

      * To parse an event from an email message, the email must have a dateand subject field.

      ** To parse an indicator from an email message, the email must contain a subject field.

      *** If an object in body_multipart has a body field (body_multipart[].body), an attribute is created. The attribute's name is "Body Multipart" and the attribute's value is in the format "Content Type: {body_multipart[].content_type}, Content Disposition: {body_multipart[].content_disposition}, Body: {body_multipart[].body}".

      Note: Parsing both an indicator and event from an email message will relate the two objects .

    7. File MappingFile Mapping
      STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
      type: file Indicator.Type Filename
      size Indicator.Attribute File Size
      hashes{}    
      hashes{}.key Indicator.Type MD5 / SHA-1 / SHA-256 / SHA-384 / SHA-512 / Fuzzy Hash
      hashes{}.value Indicator.Value  
      name Indicator.Value  
      name_enc Indicator.Attribute File Name Encoding
      magic_number_hex Indicator.Attribute Magic Number Hex
      mime_type Indicator.Attribute MIME Type
      created Indicator.Attribute Created At
      accessed Indicator.Attribute Last Accessed
      parent_directory_ref Indicator.Relationship  
      is_encrypted Indicator.Attribute Encrypted
      encryption_algorithm Indicator.Attribute Encryption Algorithm
      decryption_key Indicator.Attribute Decryption Key
      contains_refs[] Indicator.Relationship  
      content_ref Indicator.Relationship  
      extensions.archive-ext.contains_refs[] Indicator.Relationship  
      extensions.archive-ext.version Indicator.Attribute Archive Version
      extensions.archive-ext.comment Indicator.Attribute Archive File Comment
      extensions.ntfs-ext.sid Indicator.Attribute Security ID
      extensions.ntfs-ext.alternate_data_streams[].hashes{}    
      extensions.ntfs-ext.alternate_data_streams[].hashes{}.key Indicator.Type MD5 / SHA-1 / SHA-256 / SHA-384 / SHA-512 / Fuzzy Hash
      extensions.ntfs-ext.alternate_data_streams[].hashes{}.value Indicator.Value  
      extensions.ntfs-ext.alternate_data_streams[].name Indicator.Attribute Alternate Data Stream Name
      extensions.ntfs-ext.alternate_data_streams[].size Indicator.Attribute Alternate Data Stream Size
      extensions.pdf-ext.version Indicator.Attribute PDF Specification Version
      extensions.pdf-ext.is_optimized Indicator.Attribute PDF Is Optimized
      extensions.pdf-ext.document_info_dict{}.key/value Indicator.Attribute Formatted as: 'PDF {key.title()}'
      extensions.pdf-ext.pdfid0 Indicator.Attribute PDF First File Identifier
      extensions.pdf-ext.pdfid1 Indicator.Attribute PDF Second File Identifier
      extensions.raster-image-ext.image_height Indicator.Attribute Image Height
      extensions.raster-image-ext.image_width Indicator.Attribute Image Width
      extensions.raster-image-ext.bits_per_pixel Indicator.Attribute Image Bits Per Pixel
      extensions.raster-image-ext.image_compression_algorithm Indicator.Attribute Image Compression Algorithm
      extensions.raster-image-ext.exif_tags{}.key/value Indicator.Attribute Formatted as: 'Image EXIF {key.title()}'
      extensions.windows-pebinary-ext.pe_type Indicator.Attribute Executable Extension Type
      extensions.windows-pebinary-ext.imphash Indicator.Attribute Executable Imphash
      extensions.windows-pebinary-ext.machine_hex Indicator.Attribute Target Machine Hex
      extensions.windows-pebinary-ext.number_of_sections Indicator.Attribute PE Binary Section Count
      extensions.windows-pebinary-ext.time_date_stamp Indicator.Attribute PE Binary Created Date
      extensions.windows-pebinary-ext.pointer_to_symbol_table_hex Indicator.Attribute Symbol Table Hex Offset
      extensions.windows-pebinary-ext.number_of_symbols Indicator.Attribute PE Binary Symbol Table Size
      extensions.windows-pebinary-ext.size_of_optional_header Indicator.Attribute PE Binary Optional Header Size
      extensions.windows-pebinary-ext.characteristics_hex Indicator.Attribute PE Binary Characteristics Hex
      extensions.windows-pebinary-ext.file_header_hashes{}    
      extensions.windows-pebinary-ext.file_header_hashes{}.key Indicator.Type MD5 / SHA-1 / SHA-256 / SHA-384 / SHA-512 / Fuzzy Hash
      extensions.windows-pebinary-ext.file_header_hashes{}.value Indicator.Value  
      extensions.windows-pebinary-ext.optional_header.magic_hex Indicator.Attribute PE Binary Magic Hex
      extensions.windows-pebinary-ext.optional_header.major_linker_version Indicator.Attribute PE Binary Major Linker Version
      extensions.windows-pebinary-ext.optional_header.minor_linker_version Indicator.Attribute PE Binary Minor Linker Version
      extensions.windows-pebinary-ext.optional_header.size_of_code Indicator.Attribute PE Binary Code Size
      extensions.windows-pebinary-ext.optional_header.size_of_initialized_data Indicator.Attribute PE Binary Initialized Data Size
      extensions.windows-pebinary-ext.optional_header.size_of_uninitialized_data Indicator.Attribute PE Binary Uninitialized Data Size
      extensions.windows-pebinary-ext.optional_header.address_of_entry_point Indicator.Attribute PE Binary Memory Address Entry Point
      extensions.windows-pebinary-ext.optional_header.base_of_code Indicator.Attribute PE Binary Base Code Memory Address
      extensions.windows-pebinary-ext.optional_header.base_of_data Indicator.Attribute PE Binary Base Data Memory Address
      extensions.windows-pebinary-ext.optional_header.image_base Indicator.Attribute PE Binary Base Image Memory Address
      extensions.windows-pebinary-ext.optional_header.section_alignment Indicator.Attribute PE Binary Section Alignment Bytes
      extensions.windows-pebinary-ext.optional_header.file_alignment Indicator.Attribute PE Binary Image File Alignment Bytes
      extensions.windows-pebinary-ext.optional_header.major_os_version Indicator.Attribute Windows OS Major Version
      extensions.windows-pebinary-ext.optional_header.minor_os_version Indicator.Attribute Windows OS Minor Version
      extensions.windows-pebinary-ext.optional_header.major_image_version Indicator.Attribute Image Major Version
      extensions.windows-pebinary-ext.optional_header.minor_image_version Indicator.Attribute Image Minor Version
      extensions.windows-pebinary-ext.optional_header.major_subsystem_version Indicator.Attribute Subsystem Major Version
      extensions.windows-pebinary-ext.optional_header.minor_subsystem_version Indicator.Attribute Subsystem Minor Version
      extensions.windows-pebinary-ext.optional_header.win32_version_value_hex Indicator.Attribute Win32 Version Hex
      extensions.windows-pebinary-ext.optional_header.size_of_image Indicator.Attribute Image Byte Size
      extensions.windows-pebinary-ext.optional_header.size_of_headers Indicator.Attribute PE Binary Combined Header Size
      extensions.windows-pebinary-ext.optional_header.checksum_hex Indicator.Attribute PE Binary Checksum Hex
      extensions.windows-pebinary-ext.optional_header.subsystem_hex Indicator.Attribute PE Binary Required Subsystem Hex
      extensions.windows-pebinary-ext.optional_header.dll_characteristics_hex Indicator.Attribute DLL Characteristics Hex
      extensions.windows-pebinary-ext.optional_header.size_of_stack_reserve Indicator.Attribute Reserved Stack Size
      extensions.windows-pebinary-ext.optional_header.size_of_stack_commit Indicator.Attribute Stack Commit Size
      extensions.windows-pebinary-ext.optional_header.size_of_heap_reserve Indicator.Attribute Heap Space Reserve Size
      extensions.windows-pebinary-ext.optional_header.size_of_heap_commit Indicator.Attribute Heap Space Commit Size
      extensions.windows-pebinary-ext.optional_header.loader_flags_hex Indicator.Attribute Loader Flags Hex
      extensions.windows-pebinary-ext.optional_header.number_of_rva_and_sizes Indicator.Attribute Number of RVA and Sizes
      extensions.windows-pebinary-ext.optional_header.hashes{}    
      extensions.windows-pebinary-ext.optional_header.hashes{}.key Indicator.Type MD5 / SHA-1 / SHA-256 / SHA-384 / SHA-512 / Fuzzy Hash
      extensions.windows-pebinary-ext.optional_header.hashes{}.value Indicator.Value  
      extensions.windows-pebinary-ext.sections[].hashes{}    
      extensions.windows-pebinary-ext.sections[].hashes{}.key Indicator.Type MD5 / SHA-1 / SHA-256 / SHA-384 / SHA-512 / Fuzzy Hash
      extensions.windows-pebinary-ext.sections[].hashes{}.value Indicator.Value  
      extensions.windows-pebinary-ext.sections[].name Indicator.Attribute PE Binary Section Name
      extensions.windows-pebinary-ext.sections[].size Indicator.Attribute PE Binary Section Size
      extensions.windows-pebinary-ext.sections[].entropy Indicator.Attribute PE Binary Section Entropy
    8. IPv4 MappingIPv4 Mapping
      STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
      type: ipv4-addr Indicator.Type CIDR Block (if value contains a / and does not end with /32)
      IP Address (if the value ends with /32, the /32 is omitted and reported as an IP Address)
      value Indicator.Value  
      resolves_to_refs[] Indicator.Relationship  
      belongs_to_refs[] Indicator.Relationship  
    9. IPv6 MappingIPv6 Mapping
      STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
      type: ipv6-addr Indicator.Type IPv6 Address
      value Indicator.Value  
      resolves_to_refs[] Indicator.Relationship  
      belongs_to_refs[] Indicator.Relationship  
    10. MAC MappingMAC Mapping
      STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
      type: mac-addr Indicator.Type MAC Address
      value Indicator.Value  
    11. Mutex MappingMutex Mapping
      STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
      type: mutex Indicator.Type Mutex
      name Indicator.Value  
    12. URL MappingURL Mapping
      STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
      type: url Indicator.Type URL
      value Indicator.Value  
    13. User Account MappingUser Account Mapping
      STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
      type: user-account Indicator.Type Username
      user_id Indicator.Attribute User ID
      account_login Indicator.Value  
      account_type Indicator.Attribute Account Type
      display_name Indicator.Attribute Display Name
      is_service_account Indicator.Attribute Is Service Account
      is_privileged Indicator.Attribute Is Privileged Account
      can_escalate_privs Indicator.Attribute Can Escalate Privileges
      is_disabled Indicator.Attribute Is Disabled
      account_created Indicator.Attribute Account Created
      account_expires Indicator.Attribute Account Expires
      password_last_changed Indicator.Attribute Password Last Changed
      account_first_login Indicator.Attribute Account First Login
      account_last_login Indicator.Attribute Account Last Login
      extensions.unix-account-ext.gid Indicator.Attribute Account Group ID
      extensions.unix-account-ext.groups[] Indicator.Attribute Account Group
      extensions.unix-account-ext.home_dir Indicator.Attribute Account Home Directory
      extensions.unix-account-ext.shell Indicator.Attribute Account Command Shell
    14. Windows Registry Key MappingWindows Registry Key Mapping
      STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
      type: windows-registry-key Indicator.Type Registry Key
      key Indicator.Value  
      values[].name Indicator.Attribute Registry Name
      modified Indicator.Attribute Registry Modified At
      creator_user_ref Indicator.Relationship

       

  • Campaigns MappingCampaigns Mapping
    STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
    aliases Campaign  
    created Campaign.Published_at  
    description Campaign.Description  
    first_seen Campaign.Started_at  
    last_seen Campaign.Ended_at  
    modified Campaign.Attribute Modified At
    name Campaign.Value  
    objective Campaign.Objective  
    revoked (if revoked == true) Campaign.Attribute Revoked
    external_references[] See External References  
    labels Campaign.Attribute Label
  • Courses of Action MappingCourses of Action Mapping
    STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
    created Course of Action.Published_at  
    modified Course of Action.Attribute Modified At
    name Course of Action.Value  
    description Course of Action.Description  
    action    
    revoked (if revoked == true) Course of Action.Attribute Revoked
    external_references[] See External References  
    labels Course of Action.Attribute Label
  • Intrusion Sets MappingIntrusion Sets Mapping
    STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
    aliases Intrusion Set  
    created Intrusion Set.Published_at  
    description Intrusion Set.Description  
    first_seen    
    goals Intrusion Set.Attribute Goal
    modified Intrusion Set.Attribute Modified At
    name Intrusion Set.Value  
    primary_motivation Intrusion Set.Attribute Primary Motivation
    resource_level Intrusion Set.Attribute Resource Level
    secondary_motivations Intrusion Set.Attribute Secondary Motivation
    external_references[] See External References  
    revoked (if revoked == true) Intrusion Set.Attribute Revoked
  • Malware MappingMalware Mapping
    STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
    created Malware.Published_at  
    description Malware.Description  
    kill_chain_phases.[] See Kill Chain Table  
    labels Malware.Attribute Label
    modified Malware.Attribute Modified At
    name Malware.Value  
    external_references[] See External References  
    revoked (if revoked == true) Malware.Attribute Revoked
  • Tools MappingTools Mapping
    STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
    created Tool.Published_at  
    modified Tool.Attribute Modified At
    labels Tool.Attribute Label
    name Tool.Value  
    revoked (if revoked == true) Tool.Attribute Revoked
    external_references[] See External References  
    description Tool.Description  
    kill_chain_phases.[] See Kill Chain Table  
    tool_version Tool.Attribute Tool Version
  • Reports MappingReports Mapping
    STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
    created Report.Published_at  
    modified Report.Attribute Modified At
    name Report.Value  
    description Report.Description  
    labels Report.Attribute Label
    object_refs Report.Relationship.Link  
    external_references[] See External References  
    revoked (if revoked == true) Report.Attribute Revoked
  • Sightings MappingSightings Mapping
    STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
    count Event.Attribute Count
    created Event.published_at  
    first_seen Event.happened_at  
    last_seen Event.Attribute Last Seen
    observed_data_refs Event.relationship.link  
    sighting_of_ref Event.relationship.link  
    where_sighted_refs Event.relationship.link  
    revoked (if revoked == true) Object.attribute Revoked
      Event.name STIX Sighting
      Event.type Sighting
    external_references[] See External References  
    modified Event.Attribute Modified

 

 

External References

STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
Object.external_references[].source_name Object.Attribute External Reference*
Object.external_references[].external_id Object.Attribute External Reference*
Object.external_references[].description Object.Attribute External Reference*
Object.external_references[].url Object.Attribute External Reference*
* Formatted as: {source_name} ({external_id}): {description} - {url}

 

Kill Chain Phases

 

STIX 2.0 Field ThreatQ Field Mapping ThreatQ Name
kill_chain_phases[].kill_chain_name Object.Attribute Kill Chain Name
kill_chain_phases[].phase_name Object.Attribute Kill Chain Phase