Malware Analysis
Malware Analysis captures the metadata and results of a particular static or dynamic analysis performed on a malware instance or family. One of result or analysis_sco_refs properties MUST be provided.
Properties
Property | Type | Description |
---|---|---|
type optional | string | The type of this object, which MUST be the literal `malware-analysis`. |
product required | string | The name of the analysis engine or product that was used for this analysis. |
version optional | string | The version of the analysis product that was used to perform this analysis. |
configuration_version optional | string | The version of the analysis product configuration that was used to perform this analysis. |
modules optional | list of string | The particular analysis product modules that were used to perform the analysis. |
analysis_engine_version optional | string | The version of the analysis engine or product that was used to perform this analysis. |
analysis_definition_version optional | string | The version of the analysis definitions used by the analysis tool. |
submitted optional | string | Represents timestamps across the CTI specifications. The format is an RFC3339 timestamp, with a required timezone specification of 'Z'. |
analysis_started optional | string | Represents timestamps across the CTI specifications. The format is an RFC3339 timestamp, with a required timezone specification of 'Z'. |
analysis_ended optional | string | Represents timestamps across the CTI specifications. The format is an RFC3339 timestamp, with a required timezone specification of 'Z'. |
result_name optional | string | The classification result or name assigned to the malware instance by the scanner tool. |
result optional | string | The classification result as determined by the scanner or tool analysis process. |
host_vm_ref optional |
| A description of the virtual machine environment used to host the guest operating system (if applicable) that was used for the dynamic analysis of the malware instance or family. |
operating_system_ref optional |
| The operating system that was used to perform the dynamic analysis. |
installed_software_refs optional | list | Any non-standard software installed on the operating system used for the dynamic analysis of the malware instance or family. |
analysis_sco_refs optional | list of string | The list of STIX objects that were captured during the analysis process. |
sample_ref optional |
| Refers to the object this analysis was performed against. |
Relationships
These are the relationships explicitly defined between the Malware Analysis object and other STIX Objects. The first section lists the embedded relationships by property name along with their corresponding target. The rest of the table identifies the relationships that can be made from this object type to another object type by way of the Relationship object. The reverse relationships section illustrates the relationships targeting this object type from another object type. They are included here for convenience. For their definitions, please see the "Source" object.
Relationships are not restricted to those listed below. Relationships can be created between any objects using the related-to relationship type or, as with open vocabularies, user-defined names.