Define Intrusion Set
- UpdatedAug 1, 2024
- 4 minutes to read
Define an intrusion set that is a grouped set of adversarial behaviors and resources with common properties.
Before you begin
Role required: sn_sec_tisc.analyst
Procedure
What to do next
Click any of the following related lists to view additional information about objects associated with the intrusion set.
| Field | Description |
|---|---|
| External References | Lists the external references which refer to non-STIX information. This property is used to provide one or more external object identifiers. |
| Attack Patterns | Lists the attack patterns that help categorize attacks that are associated with this object. |
| Campaigns | Lists the campaigns associated with this object. |
| Identities | List of identities associated with this object. |
| Indicators | Lists the related Indicators of Compromise (IoC) that have been identified by the threat source associated with this object. |
| Infrastructure | Lists systems, software services, and any associated physical or virtual resources that are associated with this object. |
| Locations | Lists the locations that provide geographic context to this object. |
| Malware | Lists the malicious code associated with this object. |
| Marketing Definitions | Lists the marketing definitions associated with this object. |
| Sightings | Lists the sightings associated with this object. |
| Threat Actors | Lists the individuals, groups, or organizations who act with malicious intent associated with this object. |
| Tools | Lists legitimate software that is used by threat actors to perform attacks associated with this object. |
| Vulnerabilities | Lists a weakness or defect in a software or hardware that attackers exploit which is associated with this object. |
Note:
- You can link and unlink the related records associated with this object. For more information, see Link Threat Intel Related Records.
- The various SDOs within the TI library also contains the potential relationships. To establish a relationships between any two objects, you use the Potential Relationships link from the Threat Intel Library to confirm the relationships between the objects. For more information, see Confirm object-object potential relationships.
- Also, use the Related Records section from the objects form view to confirm the relationships between two Objects using the Potential Relationships section available on the form view. For more information on see, Confirm Potential Relationships from Related Records.
- You can add objects to cases. For more information, see Add to Case.