Current ThreatQ Version Filter
 

About System Objects

THREATQ REQUIRED PERMISSIONS

Default ThreatQ Role: Administrative, Maintenance, or Primary Contributor
Custom Role - Action Permissions:
Objects & Context - Objects, Individual Object Context & Actions

System objects are threat data ingested or manually added to your Threat Library.  ThreatQ is seeded with the following system object types:

System Object Description Related Topics
Adversaries Individuals or groups that attempt to perform malicious actions against other individuals or organizations. Adversaries
Assets Tangible or intangible items of value to stakeholders. Assets
Attack Patterns Descriptions of methods used to exploit software. Attack Patterns
Campaigns Groups of behaviors that describe malicious activities taken against specific targets over a period of time. Campaigns
Courses of Action A combination of risk response measures taken to address or prevent malicious attacks.  Courses of Action
Events Objects that focus on temporal incidents that have significant security impact. About Events
Exploit Targets Identified vulnerabilities in a system, software, or network that can be targeted by tactics, techniques, and procedures (TTP). Exploit Targets
Files Received from various intelligence providers and may contain technical cybersecurity data such as Indicators, Adversaries, and Malware samples. Files
Identities Contain basic identifying information for targeted groups such as information sources, threat actor identities, and targets of attack.   Identities
Incidents Records of any violation of an organization's established security/network policy that may compromise security, integrity, or general access. Incidents
Indicators Information that describes or identifies methods used to defeat security controls, exploit vulnerabilities, and gain unauthorized access to an internal network. Indicators can also describe malicious reconnaissance to gather technical information, malicious cyber command and control, and any other attribute of cyber security whose disclosure is prohibited by law. About Indicators
Infrastructure Information that describes any systems, software services and associated physical or virtual resources intended to support a specific purpose. Infrastructure
Intrusion Sets Grouped sets of adversarial behaviors and resources, sometimes referred to as attack packages, used to target an individual organization.   Intrusion Sets
Malware Targets devices, services, and networks with the intent to gain unauthorized access or damage a network or programmable device.     Malware
Notes STIX 2.1 objects that provide further context and/or additional analysis. Notes
Reports Contain information and related details for a specific threat such as Malware.   Reports
Signatures Contain the blueprints or patterns associated with a malicious attack on a network or system.    Signatures
STIX Refers to data in the STIX (Structured Threat Information eXpression) format.  STIX is a standardized XML programming language for conveying data about cybersecurity threats. About STIX
Tasks Allow you to create and assign tasks to yourself or other users in the platform. Tasks
Tools A legitimate application that can be leveraged to perform malicious activities. Tools
TTP Describes how an intruder may attempt to access your system.   TTP
Vulnerabilities Applications that can be exploited to infiltrate systems/networks.   Vulnerabilities