Relationship type compatibility tables#
The sections on this page describe the available relationship types for each source/target entity combination, and their STIX compatibility.
A relationship is an object that links two entities together:
a ‘source’ entity, and
a ‘target’ entity.
Depending on the source and target entity, certain relationship types are available for use. These relationship types have varying compatibility with STIX 2.1 and STIX 1.2.
For more information about relationship objects and STIX compatibility, see Intelligence metadata | Relationships.
Attack-pattern#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
attack-pattern  | 
delivers  | 
malware  | 
NO  | 
YES  | 
NO  | 
attack-pattern  | 
related-to  | 
attack-pattern  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
related-to  | 
campaign  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
related-to  | 
course-of-action  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
related-to  | 
incident  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
related-to  | 
indicator  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
related-to  | 
infrastructure  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
related-to  | 
intrusion-set  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
related-to  | 
location  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
related-to  | 
malware-analysis  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
related-to  | 
report  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
related-to  | 
threat-actor  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
related-to  | 
ttp  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
targets  | 
identity  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
targets  | 
location  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
targets  | 
vulnerability  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
uses  | 
malware  | 
YES  | 
YES  | 
NO  | 
attack-pattern  | 
uses  | 
tool  | 
YES  | 
YES  | 
NO  | 
Campaign#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
campaign  | 
associated-to  | 
campaign  | 
NO  | 
NO  | 
YES  | 
campaign  | 
attributed-to  | 
intrusion-set  | 
YES  | 
YES  | 
NO  | 
campaign  | 
attributed-to  | 
threat-actor  | 
YES  | 
YES  | 
NO  | 
campaign  | 
compromises  | 
infrastructure  | 
NO  | 
YES  | 
NO  | 
campaign  | 
originates-from  | 
location  | 
NO  | 
YES  | 
NO  | 
campaign  | 
related-to  | 
campaign  | 
YES  | 
YES  | 
NO  | 
campaign  | 
related-to  | 
course-of-action  | 
YES  | 
YES  | 
NO  | 
campaign  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
YES  | 
NO  | 
campaign  | 
related-to  | 
incident  | 
YES  | 
YES  | 
NO  | 
campaign  | 
related-to  | 
indicator  | 
YES  | 
YES  | 
NO  | 
campaign  | 
related-to  | 
location  | 
YES  | 
YES  | 
NO  | 
campaign  | 
related-to  | 
malware-analysis  | 
YES  | 
YES  | 
NO  | 
campaign  | 
related-to  | 
report  | 
YES  | 
YES  | 
NO  | 
campaign  | 
related-to  | 
ttp  | 
YES  | 
YES  | 
YES  | 
campaign  | 
targets  | 
identity  | 
YES  | 
YES  | 
YES  | 
campaign  | 
targets  | 
location  | 
NO  | 
YES  | 
NO  | 
campaign  | 
targets  | 
vulnerability  | 
YES  | 
YES  | 
NO  | 
campaign  | 
uses  | 
attack-pattern  | 
YES  | 
YES  | 
NO  | 
campaign  | 
uses  | 
infrastructure  | 
YES  | 
YES  | 
NO  | 
campaign  | 
uses  | 
malware  | 
YES  | 
YES  | 
NO  | 
campaign  | 
uses  | 
tool  | 
YES  | 
YES  | 
NO  | 
Course-of-action#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
course-of-action  | 
investigates  | 
indicator  | 
YES  | 
YES  | 
NO  | 
course-of-action  | 
mitigates  | 
attack-pattern  | 
YES  | 
YES  | 
NO  | 
course-of-action  | 
mitigates  | 
indicator  | 
NO  | 
YES  | 
NO  | 
course-of-action  | 
mitigates  | 
malware  | 
YES  | 
YES  | 
NO  | 
course-of-action  | 
mitigates  | 
tool  | 
YES  | 
YES  | 
NO  | 
course-of-action  | 
mitigates  | 
vulnerability  | 
YES  | 
YES  | 
NO  | 
course-of-action  | 
related-to  | 
campaign  | 
YES  | 
YES  | 
NO  | 
course-of-action  | 
related-to  | 
course-of-action  | 
YES  | 
YES  | 
YES  | 
course-of-action  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
YES  | 
NO  | 
course-of-action  | 
related-to  | 
identity  | 
YES  | 
YES  | 
NO  | 
course-of-action  | 
related-to  | 
incident  | 
YES  | 
YES  | 
NO  | 
course-of-action  | 
related-to  | 
infrastructure  | 
YES  | 
YES  | 
NO  | 
course-of-action  | 
related-to  | 
intrusion-set  | 
YES  | 
YES  | 
NO  | 
course-of-action  | 
related-to  | 
location  | 
YES  | 
YES  | 
NO  | 
course-of-action  | 
related-to  | 
malware-analysis  | 
YES  | 
YES  | 
NO  | 
course-of-action  | 
related-to  | 
report  | 
YES  | 
YES  | 
NO  | 
course-of-action  | 
related-to  | 
threat-actor  | 
YES  | 
YES  | 
NO  | 
course-of-action  | 
related-to  | 
ttp  | 
YES  | 
YES  | 
NO  | 
course-of-action  | 
remediates  | 
malware  | 
NO  | 
YES  | 
NO  | 
course-of-action  | 
remediates  | 
vulnerability  | 
NO  | 
YES  | 
NO  | 
Sighting#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
eclecticiq-sighting  | 
related-to  | 
attack-pattern  | 
YES  | 
NO  | 
NO  | 
eclecticiq-sighting  | 
related-to  | 
campaign  | 
YES  | 
NO  | 
NO  | 
eclecticiq-sighting  | 
related-to  | 
course-of-action  | 
YES  | 
NO  | 
NO  | 
eclecticiq-sighting  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
NO  | 
NO  | 
eclecticiq-sighting  | 
related-to  | 
identity  | 
YES  | 
NO  | 
NO  | 
eclecticiq-sighting  | 
related-to  | 
incident  | 
YES  | 
NO  | 
NO  | 
eclecticiq-sighting  | 
related-to  | 
indicator  | 
YES  | 
NO  | 
NO  | 
eclecticiq-sighting  | 
related-to  | 
infrastructure  | 
YES  | 
NO  | 
NO  | 
eclecticiq-sighting  | 
related-to  | 
intrusion-set  | 
YES  | 
NO  | 
NO  | 
eclecticiq-sighting  | 
related-to  | 
location  | 
YES  | 
NO  | 
NO  | 
eclecticiq-sighting  | 
related-to  | 
malware  | 
YES  | 
NO  | 
NO  | 
eclecticiq-sighting  | 
related-to  | 
malware-analysis  | 
YES  | 
NO  | 
NO  | 
eclecticiq-sighting  | 
related-to  | 
report  | 
YES  | 
NO  | 
NO  | 
eclecticiq-sighting  | 
related-to  | 
threat-actor  | 
YES  | 
NO  | 
NO  | 
eclecticiq-sighting  | 
related-to  | 
tool  | 
YES  | 
NO  | 
NO  | 
eclecticiq-sighting  | 
related-to  | 
ttp  | 
YES  | 
NO  | 
NO  | 
eclecticiq-sighting  | 
related-to  | 
vulnerability  | 
YES  | 
YES  | 
NO  | 
Identity#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
identity  | 
located-at  | 
location  | 
YES  | 
YES  | 
NO  | 
identity  | 
related-to  | 
attack-pattern  | 
YES  | 
YES  | 
NO  | 
identity  | 
related-to  | 
campaign  | 
YES  | 
YES  | 
NO  | 
identity  | 
related-to  | 
course-of-action  | 
YES  | 
YES  | 
NO  | 
identity  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
YES  | 
NO  | 
identity  | 
related-to  | 
identity  | 
YES  | 
YES  | 
NO  | 
identity  | 
related-to  | 
incident  | 
YES  | 
YES  | 
NO  | 
identity  | 
related-to  | 
indicator  | 
YES  | 
YES  | 
NO  | 
identity  | 
related-to  | 
infrastructure  | 
YES  | 
YES  | 
NO  | 
identity  | 
related-to  | 
intrusion-set  | 
YES  | 
YES  | 
NO  | 
identity  | 
related-to  | 
malware  | 
YES  | 
YES  | 
NO  | 
identity  | 
related-to  | 
malware-analysis  | 
YES  | 
YES  | 
NO  | 
identity  | 
related-to  | 
report  | 
YES  | 
YES  | 
NO  | 
identity  | 
related-to  | 
threat-actor  | 
YES  | 
YES  | 
NO  | 
identity  | 
related-to  | 
tool  | 
YES  | 
YES  | 
NO  | 
identity  | 
related-to  | 
ttp  | 
YES  | 
YES  | 
NO  | 
identity  | 
related-to  | 
vulnerability  | 
YES  | 
YES  | 
NO  | 
Incident#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
incident  | 
attributed-to  | 
threat-actor  | 
NO  | 
YES  | 
YES  | 
incident  | 
leveraged  | 
ttp  | 
YES  | 
YES  | 
YES  | 
incident  | 
related-to  | 
attack-pattern  | 
YES  | 
YES  | 
NO  | 
incident  | 
related-to  | 
campaign  | 
YES  | 
YES  | 
NO  | 
incident  | 
related-to  | 
course-of-action  | 
YES  | 
YES  | 
NO  | 
incident  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
YES  | 
NO  | 
incident  | 
related-to  | 
identity  | 
YES  | 
YES  | 
NO  | 
incident  | 
related-to  | 
incident  | 
YES  | 
YES  | 
YES  | 
incident  | 
related-to  | 
indicator  | 
YES  | 
YES  | 
YES  | 
incident  | 
related-to  | 
infrastructure  | 
YES  | 
YES  | 
NO  | 
incident  | 
related-to  | 
intrusion-set  | 
YES  | 
YES  | 
NO  | 
incident  | 
related-to  | 
location  | 
YES  | 
YES  | 
NO  | 
incident  | 
related-to  | 
malware  | 
YES  | 
YES  | 
NO  | 
incident  | 
related-to  | 
malware-analysis  | 
YES  | 
YES  | 
NO  | 
incident  | 
related-to  | 
report  | 
YES  | 
YES  | 
NO  | 
incident  | 
related-to  | 
threat-actor  | 
YES  | 
YES  | 
NO  | 
incident  | 
related-to  | 
tool  | 
YES  | 
YES  | 
NO  | 
incident  | 
related-to  | 
vulnerability  | 
YES  | 
YES  | 
NO  | 
Indicator#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
indicator  | 
indicates  | 
attack-pattern  | 
YES  | 
YES  | 
NO  | 
indicator  | 
indicates  | 
campaign  | 
YES  | 
YES  | 
NO  | 
indicator  | 
indicates  | 
infrastructure  | 
YES  | 
YES  | 
NO  | 
indicator  | 
indicates  | 
intrusion-set  | 
YES  | 
YES  | 
NO  | 
indicator  | 
indicates  | 
malware  | 
YES  | 
YES  | 
NO  | 
indicator  | 
indicates  | 
threat-actor  | 
YES  | 
YES  | 
NO  | 
indicator  | 
indicates  | 
tool  | 
YES  | 
YES  | 
NO  | 
indicator  | 
related-to  | 
campaign  | 
NO  | 
YES  | 
YES  | 
indicator  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
YES  | 
NO  | 
indicator  | 
related-to  | 
identity  | 
YES  | 
YES  | 
NO  | 
indicator  | 
related-to  | 
incident  | 
YES  | 
YES  | 
NO  | 
indicator  | 
related-to  | 
indicator  | 
YES  | 
YES  | 
YES  | 
indicator  | 
related-to  | 
location  | 
YES  | 
YES  | 
NO  | 
indicator  | 
related-to  | 
malware-analysis  | 
YES  | 
YES  | 
NO  | 
indicator  | 
related-to  | 
report  | 
YES  | 
YES  | 
NO  | 
indicator  | 
related-to  | 
ttp  | 
YES  | 
YES  | 
YES  | 
indicator  | 
related-to  | 
vulnerability  | 
YES  | 
YES  | 
NO  | 
indicator  | 
suggests  | 
course-of-action  | 
YES  | 
NO  | 
YES  | 
Infrastructure#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
infrastructure  | 
communicates-with  | 
infrastructure  | 
NO  | 
YES  | 
NO  | 
infrastructure  | 
consists-of  | 
infrastructure  | 
NO  | 
YES  | 
NO  | 
infrastructure  | 
controls  | 
infrastructure  | 
NO  | 
YES  | 
NO  | 
infrastructure  | 
controls  | 
malware  | 
NO  | 
YES  | 
NO  | 
infrastructure  | 
delivers  | 
malware  | 
NO  | 
YES  | 
NO  | 
infrastructure  | 
has  | 
vulnerability  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
hosts  | 
malware  | 
NO  | 
YES  | 
NO  | 
infrastructure  | 
hosts  | 
tool  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
located-at  | 
location  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
related-to  | 
attack-pattern  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
related-to  | 
campaign  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
related-to  | 
course-of-action  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
related-to  | 
identity  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
related-to  | 
incident  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
related-to  | 
indicator  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
related-to  | 
infrastructure  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
related-to  | 
intrusion-set  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
related-to  | 
malware  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
related-to  | 
malware-analysis  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
related-to  | 
report  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
related-to  | 
threat-actor  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
related-to  | 
ttp  | 
YES  | 
YES  | 
NO  | 
infrastructure  | 
uses  | 
infrastructure  | 
NO  | 
YES  | 
NO  | 
Intrusion-set#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
intrusion-set  | 
attributed-to  | 
threat-actor  | 
YES  | 
YES  | 
NO  | 
intrusion-set  | 
compromises  | 
infrastructure  | 
NO  | 
YES  | 
NO  | 
intrusion-set  | 
hosts  | 
infrastructure  | 
NO  | 
YES  | 
NO  | 
intrusion-set  | 
originates-from  | 
location  | 
NO  | 
YES  | 
NO  | 
intrusion-set  | 
owns  | 
infrastructure  | 
NO  | 
YES  | 
NO  | 
intrusion-set  | 
related-to  | 
campaign  | 
YES  | 
YES  | 
NO  | 
intrusion-set  | 
related-to  | 
course-of-action  | 
YES  | 
YES  | 
NO  | 
intrusion-set  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
YES  | 
NO  | 
intrusion-set  | 
related-to  | 
incident  | 
YES  | 
YES  | 
NO  | 
intrusion-set  | 
related-to  | 
indicator  | 
YES  | 
YES  | 
NO  | 
intrusion-set  | 
related-to  | 
intrusion-set  | 
YES  | 
YES  | 
NO  | 
intrusion-set  | 
related-to  | 
location  | 
YES  | 
YES  | 
NO  | 
intrusion-set  | 
related-to  | 
malware-analysis  | 
YES  | 
YES  | 
NO  | 
intrusion-set  | 
related-to  | 
report  | 
YES  | 
YES  | 
NO  | 
intrusion-set  | 
related-to  | 
ttp  | 
YES  | 
YES  | 
NO  | 
intrusion-set  | 
targets  | 
identity  | 
YES  | 
YES  | 
NO  | 
intrusion-set  | 
targets  | 
location  | 
NO  | 
YES  | 
NO  | 
intrusion-set  | 
targets  | 
vulnerability  | 
YES  | 
YES  | 
NO  | 
intrusion-set  | 
uses  | 
attack-pattern  | 
YES  | 
YES  | 
NO  | 
intrusion-set  | 
uses  | 
infrastructure  | 
YES  | 
YES  | 
NO  | 
intrusion-set  | 
uses  | 
malware  | 
YES  | 
YES  | 
NO  | 
intrusion-set  | 
uses  | 
tool  | 
YES  | 
YES  | 
NO  | 
Location#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
location  | 
related-to  | 
attack-pattern  | 
YES  | 
YES  | 
NO  | 
location  | 
related-to  | 
campaign  | 
YES  | 
YES  | 
NO  | 
location  | 
related-to  | 
course-of-action  | 
YES  | 
YES  | 
NO  | 
location  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
YES  | 
NO  | 
location  | 
related-to  | 
identity  | 
YES  | 
YES  | 
NO  | 
location  | 
related-to  | 
incident  | 
YES  | 
YES  | 
NO  | 
location  | 
related-to  | 
indicator  | 
YES  | 
YES  | 
NO  | 
location  | 
related-to  | 
infrastructure  | 
YES  | 
YES  | 
NO  | 
location  | 
related-to  | 
intrusion-set  | 
YES  | 
YES  | 
NO  | 
location  | 
related-to  | 
location  | 
YES  | 
YES  | 
NO  | 
location  | 
related-to  | 
malware  | 
YES  | 
YES  | 
NO  | 
location  | 
related-to  | 
malware-analysis  | 
YES  | 
YES  | 
NO  | 
location  | 
related-to  | 
report  | 
YES  | 
YES  | 
NO  | 
location  | 
related-to  | 
threat-actor  | 
YES  | 
YES  | 
NO  | 
location  | 
related-to  | 
tool  | 
YES  | 
YES  | 
NO  | 
location  | 
related-to  | 
ttp  | 
YES  | 
YES  | 
NO  | 
location  | 
related-to  | 
vulnerability  | 
YES  | 
YES  | 
NO  | 
Malware#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
malware  | 
authored-by  | 
intrusion-set  | 
YES  | 
YES  | 
NO  | 
malware  | 
authored-by  | 
threat-actor  | 
YES  | 
YES  | 
NO  | 
malware  | 
beacons-to  | 
infrastructure  | 
NO  | 
YES  | 
NO  | 
malware  | 
controls  | 
malware  | 
NO  | 
YES  | 
NO  | 
malware  | 
downloads  | 
malware  | 
NO  | 
YES  | 
NO  | 
malware  | 
downloads  | 
tool  | 
NO  | 
YES  | 
NO  | 
malware  | 
drops  | 
malware  | 
NO  | 
YES  | 
NO  | 
malware  | 
drops  | 
tool  | 
NO  | 
YES  | 
NO  | 
malware  | 
exfiltrates-to  | 
infrastructure  | 
NO  | 
YES  | 
NO  | 
malware  | 
exploits  | 
vulnerability  | 
YES  | 
YES  | 
NO  | 
malware  | 
originates-from  | 
location  | 
NO  | 
YES  | 
NO  | 
malware  | 
related-to  | 
campaign  | 
YES  | 
YES  | 
NO  | 
malware  | 
related-to  | 
course-of-action  | 
YES  | 
YES  | 
NO  | 
malware  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
YES  | 
NO  | 
malware  | 
related-to  | 
incident  | 
YES  | 
YES  | 
NO  | 
malware  | 
related-to  | 
location  | 
YES  | 
YES  | 
NO  | 
malware  | 
related-to  | 
malware-analysis  | 
YES  | 
YES  | 
NO  | 
malware  | 
related-to  | 
report  | 
YES  | 
YES  | 
NO  | 
malware  | 
related-to  | 
ttp  | 
YES  | 
YES  | 
NO  | 
malware  | 
targets  | 
identity  | 
YES  | 
YES  | 
NO  | 
malware  | 
targets  | 
infrastructure  | 
NO  | 
YES  | 
NO  | 
malware  | 
targets  | 
location  | 
NO  | 
YES  | 
NO  | 
malware  | 
targets  | 
vulnerability  | 
NO  | 
YES  | 
NO  | 
malware  | 
uses  | 
attack-pattern  | 
YES  | 
YES  | 
NO  | 
malware  | 
uses  | 
infrastructure  | 
YES  | 
YES  | 
NO  | 
malware  | 
uses  | 
malware  | 
YES  | 
YES  | 
NO  | 
malware  | 
uses  | 
tool  | 
YES  | 
YES  | 
NO  | 
malware  | 
variant-of  | 
malware  | 
NO  | 
YES  | 
NO  | 
Malware-analysis#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
malware-analysis  | 
analysis-of  | 
malware  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
characterizes  | 
malware  | 
NO  | 
YES  | 
NO  | 
malware-analysis  | 
dynamic-analysis-of  | 
malware  | 
NO  | 
YES  | 
NO  | 
malware-analysis  | 
related-to  | 
attack-pattern  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
related-to  | 
campaign  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
related-to  | 
course-of-action  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
related-to  | 
identity  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
related-to  | 
incident  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
related-to  | 
indicator  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
related-to  | 
infrastructure  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
related-to  | 
intrusion-set  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
related-to  | 
location  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
related-to  | 
malware-analysis  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
related-to  | 
report  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
related-to  | 
threat-actor  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
related-to  | 
tool  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
related-to  | 
ttp  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
related-to  | 
vulnerability  | 
YES  | 
YES  | 
NO  | 
malware-analysis  | 
static-analysis-of  | 
malware  | 
NO  | 
YES  | 
NO  | 
Report#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
report  | 
related-to  | 
attack-pattern  | 
YES  | 
YES  | 
NO  | 
report  | 
related-to  | 
campaign  | 
YES  | 
YES  | 
YES  | 
report  | 
related-to  | 
course-of-action  | 
YES  | 
YES  | 
NO  | 
report  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
YES  | 
NO  | 
report  | 
related-to  | 
identity  | 
YES  | 
YES  | 
NO  | 
report  | 
related-to  | 
incident  | 
YES  | 
YES  | 
NO  | 
report  | 
related-to  | 
indicator  | 
YES  | 
YES  | 
NO  | 
report  | 
related-to  | 
infrastructure  | 
YES  | 
YES  | 
NO  | 
report  | 
related-to  | 
intrusion-set  | 
YES  | 
YES  | 
NO  | 
report  | 
related-to  | 
location  | 
YES  | 
YES  | 
NO  | 
report  | 
related-to  | 
malware  | 
YES  | 
YES  | 
NO  | 
report  | 
related-to  | 
malware-analysis  | 
YES  | 
YES  | 
NO  | 
report  | 
related-to  | 
report  | 
YES  | 
YES  | 
YES  | 
report  | 
related-to  | 
threat-actor  | 
YES  | 
YES  | 
NO  | 
report  | 
related-to  | 
tool  | 
YES  | 
YES  | 
NO  | 
report  | 
related-to  | 
vulnerability  | 
YES  | 
YES  | 
NO  | 
report  | 
reports  | 
campaign  | 
NO  | 
YES  | 
YES  | 
report  | 
reports  | 
course-of-action  | 
NO  | 
YES  | 
YES  | 
report  | 
reports  | 
incident  | 
NO  | 
YES  | 
YES  | 
report  | 
reports  | 
indicator  | 
NO  | 
YES  | 
YES  | 
report  | 
reports  | 
threat-actor  | 
NO  | 
NO  | 
YES  | 
report  | 
reports  | 
ttp  | 
YES  | 
NO  | 
YES  | 
report  | 
reports  | 
vulnerability  | 
NO  | 
YES  | 
YES  | 
Threat-actor#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
threat-actor  | 
associated-to  | 
campaign  | 
NO  | 
YES  | 
YES  | 
threat-actor  | 
associated-to  | 
threat-actor  | 
YES  | 
YES  | 
YES  | 
threat-actor  | 
attributed-to  | 
identity  | 
NO  | 
YES  | 
NO  | 
threat-actor  | 
compromises  | 
infrastructure  | 
NO  | 
YES  | 
NO  | 
threat-actor  | 
hosts  | 
infrastructure  | 
NO  | 
YES  | 
NO  | 
threat-actor  | 
impersonates  | 
identity  | 
NO  | 
YES  | 
NO  | 
threat-actor  | 
located-at  | 
location  | 
NO  | 
YES  | 
NO  | 
threat-actor  | 
observed  | 
ttp  | 
YES  | 
YES  | 
YES  | 
threat-actor  | 
owns  | 
infrastructure  | 
NO  | 
YES  | 
NO  | 
threat-actor  | 
related-to  | 
campaign  | 
YES  | 
YES  | 
YES  | 
threat-actor  | 
related-to  | 
course-of-action  | 
YES  | 
YES  | 
NO  | 
threat-actor  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
YES  | 
NO  | 
threat-actor  | 
related-to  | 
incident  | 
YES  | 
YES  | 
NO  | 
threat-actor  | 
related-to  | 
indicator  | 
YES  | 
YES  | 
NO  | 
threat-actor  | 
related-to  | 
intrusion-set  | 
YES  | 
YES  | 
NO  | 
threat-actor  | 
related-to  | 
location  | 
YES  | 
YES  | 
NO  | 
threat-actor  | 
related-to  | 
malware-analysis  | 
YES  | 
YES  | 
NO  | 
threat-actor  | 
related-to  | 
report  | 
YES  | 
YES  | 
NO  | 
threat-actor  | 
targets  | 
identity  | 
YES  | 
YES  | 
NO  | 
threat-actor  | 
targets  | 
location  | 
NO  | 
YES  | 
NO  | 
threat-actor  | 
targets  | 
vulnerability  | 
YES  | 
YES  | 
NO  | 
threat-actor  | 
uses  | 
attack-pattern  | 
YES  | 
YES  | 
NO  | 
threat-actor  | 
uses  | 
infrastructure  | 
YES  | 
YES  | 
NO  | 
threat-actor  | 
uses  | 
malware  | 
YES  | 
YES  | 
NO  | 
threat-actor  | 
uses  | 
tool  | 
YES  | 
YES  | 
NO  | 
Tool#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
tool  | 
delivers  | 
malware  | 
YES  | 
YES  | 
NO  | 
tool  | 
drops  | 
malware  | 
NO  | 
YES  | 
NO  | 
tool  | 
has  | 
vulnerability  | 
NO  | 
YES  | 
NO  | 
tool  | 
related-to  | 
attack-pattern  | 
YES  | 
YES  | 
NO  | 
tool  | 
related-to  | 
campaign  | 
YES  | 
YES  | 
NO  | 
tool  | 
related-to  | 
course-of-action  | 
YES  | 
YES  | 
NO  | 
tool  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
YES  | 
NO  | 
tool  | 
related-to  | 
identity  | 
YES  | 
YES  | 
NO  | 
tool  | 
related-to  | 
incident  | 
YES  | 
YES  | 
NO  | 
tool  | 
related-to  | 
indicator  | 
YES  | 
YES  | 
NO  | 
tool  | 
related-to  | 
intrusion-set  | 
YES  | 
YES  | 
NO  | 
tool  | 
related-to  | 
location  | 
YES  | 
YES  | 
NO  | 
tool  | 
related-to  | 
malware  | 
YES  | 
YES  | 
NO  | 
tool  | 
related-to  | 
malware-analysis  | 
YES  | 
YES  | 
NO  | 
tool  | 
related-to  | 
report  | 
YES  | 
YES  | 
NO  | 
tool  | 
related-to  | 
threat-actor  | 
YES  | 
YES  | 
NO  | 
tool  | 
related-to  | 
tool  | 
YES  | 
YES  | 
NO  | 
tool  | 
related-to  | 
ttp  | 
YES  | 
YES  | 
NO  | 
tool  | 
targets  | 
identity  | 
YES  | 
YES  | 
NO  | 
tool  | 
targets  | 
infrastructure  | 
NO  | 
YES  | 
NO  | 
tool  | 
targets  | 
location  | 
YES  | 
YES  | 
NO  | 
tool  | 
targets  | 
vulnerability  | 
YES  | 
YES  | 
NO  | 
tool  | 
uses  | 
infrastructure  | 
YES  | 
YES  | 
NO  | 
TTP#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
ttp  | 
exploits  | 
vulnerability  | 
YES  | 
YES  | 
YES  | 
ttp  | 
related-to  | 
attack-pattern  | 
YES  | 
YES  | 
NO  | 
ttp  | 
related-to  | 
campaign  | 
YES  | 
YES  | 
NO  | 
ttp  | 
related-to  | 
course-of-action  | 
YES  | 
YES  | 
NO  | 
ttp  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
YES  | 
NO  | 
ttp  | 
related-to  | 
identity  | 
YES  | 
YES  | 
NO  | 
ttp  | 
related-to  | 
incident  | 
YES  | 
YES  | 
NO  | 
ttp  | 
related-to  | 
indicator  | 
YES  | 
YES  | 
NO  | 
ttp  | 
related-to  | 
infrastructure  | 
YES  | 
YES  | 
NO  | 
ttp  | 
related-to  | 
intrusion-set  | 
YES  | 
YES  | 
NO  | 
ttp  | 
related-to  | 
location  | 
YES  | 
YES  | 
NO  | 
ttp  | 
related-to  | 
malware  | 
YES  | 
YES  | 
NO  | 
ttp  | 
related-to  | 
malware-analysis  | 
YES  | 
YES  | 
NO  | 
ttp  | 
related-to  | 
report  | 
YES  | 
YES  | 
NO  | 
ttp  | 
related-to  | 
threat-actor  | 
YES  | 
YES  | 
NO  | 
ttp  | 
related-to  | 
tool  | 
YES  | 
YES  | 
NO  | 
ttp  | 
related-to  | 
ttp  | 
YES  | 
YES  | 
YES  | 
Vulnerability#
Source entity  | 
Relationship type  | 
Target entity  | 
Default suggestion  | 
STIX 2.1 compatible  | 
STIX 1.2 compatible  | 
|---|---|---|---|---|---|
vulnerability  | 
related-to  | 
attack-pattern  | 
YES  | 
YES  | 
NO  | 
vulnerability  | 
related-to  | 
campaign  | 
YES  | 
YES  | 
NO  | 
vulnerability  | 
related-to  | 
course-of-action  | 
YES  | 
YES  | 
YES  | 
vulnerability  | 
related-to  | 
eclecticiq-sighting  | 
YES  | 
YES  | 
NO  | 
vulnerability  | 
related-to  | 
identity  | 
YES  | 
YES  | 
NO  | 
vulnerability  | 
related-to  | 
incident  | 
YES  | 
YES  | 
NO  | 
vulnerability  | 
related-to  | 
indicator  | 
YES  | 
YES  | 
NO  | 
vulnerability  | 
related-to  | 
infrastructure  | 
YES  | 
YES  | 
NO  | 
vulnerability  | 
related-to  | 
intrusion-set  | 
YES  | 
YES  | 
NO  | 
vulnerability  | 
related-to  | 
location  | 
YES  | 
YES  | 
NO  | 
vulnerability  | 
related-to  | 
malware  | 
YES  | 
YES  | 
NO  | 
vulnerability  | 
related-to  | 
malware-analysis  | 
YES  | 
YES  | 
NO  | 
vulnerability  | 
related-to  | 
report  | 
YES  | 
YES  | 
NO  | 
vulnerability  | 
related-to  | 
threat-actor  | 
YES  | 
YES  | 
NO  | 
vulnerability  | 
related-to  | 
tool  | 
YES  | 
YES  | 
NO  | 
vulnerability  | 
related-to  | 
ttp  | 
YES  | 
YES  | 
NO  | 
vulnerability  | 
related-to  | 
vulnerability  | 
YES  | 
YES  | 
YES  |