Intrusion Set
An Intrusion Set is a grouped set of adversarial behaviors and resources with common properties that is believed to be orchestrated by a single organization. An Intrusion Set may capture multiple Campaigns or other activities that are all tied together by shared attributes indicating a commonly known or unknown Threat Actor. New activity can be attributed to an Intrusion Set even if the Threat Actors behind the attack are not known. Threat Actors can move from supporting one Intrusion Set to supporting another, or they may support multiple Intrusion Sets.
Where a Campaign is a set of attacks over a period of time against a specific set of targets to achieve some objective, an Intrusion Set is the entire attack package and may be used over a very long period of time in multiple Campaigns to achieve potentially multiple purposes.
While sometimes an Intrusion Set is not active, or changes focus, it is usually difficult to know if it has truly disappeared or ended. Analysts may have varying level of fidelity on attributing an Intrusion Set back to Threat Actors and may be able to only attribute it back to a nation state or perhaps back to an organization within that nation state.
Properties
Property | Type | Description |
---|---|---|
type optional | string | The type of this object, which MUST be the literal `intrusion-set`. |
name required | string | The name used to identify the Intrusion Set. |
description optional | string | Provides more context and details about the Intrusion Set object. |
aliases optional | list of string | Alternative names used to identify this Intrusion Set. |
first_seen optional | string | Represents timestamps across the CTI specifications. The format is an RFC3339 timestamp, with a required timezone specification of 'Z'. |
last_seen optional | string | Represents timestamps across the CTI specifications. The format is an RFC3339 timestamp, with a required timezone specification of 'Z'. |
goals optional | list of string | The high level goals of this Intrusion Set, namely, what are they trying to do. |
resource_level optional | string | This defines the organizational level at which this Intrusion Set typically works. Open Vocab - attack-resource-level-ov |
primary_motivation optional | string | The primary reason, motivation, or purpose behind this Intrusion Set. Open Vocab - attack-motivation-ov |
secondary_motivations optional | list of string | The secondary reasons, motivations, or purposes behind this Intrusion Set. Open Vocab - attack-motivation-ov |
Relationships
These are the relationships explicitly defined between the Intrusion Set object and other STIX Objects. The first section lists the embedded relationships by property name along with their corresponding target. The rest of the table identifies the relationships that can be made from this object type to another object type by way of the Relationship object. The reverse relationships section illustrates the relationships targeting this object type from another object type. They are included here for convenience. For their definitions, please see the "Source" object.
Relationships are not restricted to those listed below. Relationships can be created between any objects using the related-to relationship type or, as with open vocabularies, user-defined names.