2016-02-27 21:07:09 +01:00
|
|
|
|
{
|
|
|
|
|
"values": [
|
|
|
|
|
{
|
|
|
|
|
"value": "Advantage",
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"description": "The intended effect of the incident was for the attacker to obtain some advantage over the target."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
"value": "Advantage - Economic",
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"description": "The intended effect of the incident was for the attacker to obtain some economic advantage over the target."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
"value": "Advantage - Military",
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"description": "The intended effect of the incident was for the attacker to obtain some military advantage over the target."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
"value": "Advantage - Political",
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"description": "The intended effect of the incident was for the attacker to obtain some political advantage over the target."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
"value": "Theft",
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"description": "The intended effect of the incident was to perpetrate a non-specific theft."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
"value": "Theft - Intellectual Property",
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"description": "The intended effect of the incident was to perpetrate a theft of intellectual property."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"value": "Theft - Credential Theft",
|
|
|
|
|
"description": "The intended effect of the incident was to perpetrate a theft of credentials."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"value": "Theft - Identity Theft",
|
|
|
|
|
"description": "The intended effect of the incident was to perpetrate a theft of the target’s identity."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"value": "Theft - Theft of Proprietary Information",
|
|
|
|
|
"description": "The intended effect of the incident was to perpetrate a theft of proprietary information."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"value": "Account Takeover",
|
|
|
|
|
"description": "The intended effect of the incident was for the attacker to obtain control over an account (financial, etc)."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"value": "Brand Damage",
|
|
|
|
|
"description": "The intended effect of the incident was for the attacker to cause some brand damage on the target."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"value": "Competitive Advantage",
|
|
|
|
|
"description": "The intended effect of the incident was for the attacker to obtain some non-specific competitive advantage over the target."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"value": "Degradation of Service",
|
|
|
|
|
"description": "The intended effect of the incident was reducing the level of services provided by the target."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"value": "Denial and Deception",
|
|
|
|
|
"description": ""
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"value": "Destruction",
|
|
|
|
|
"description": "The intended effect of the incident was to cause the destruction of a software or hardware system."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
"value": "Disruption"
|
|
|
|
|
},
|
|
|
|
|
{
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"value": "Embarrassment",
|
|
|
|
|
"description": "The intended effect of the incident was to expose a socially unacceptable action by the target."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
"value": "Exposure"
|
|
|
|
|
},
|
|
|
|
|
{
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"value": "Extortion",
|
|
|
|
|
"description": "The intended effect of the incident was force the payment of some sort to prevent the attacker from taking some action."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
"value": "Fraud"
|
|
|
|
|
},
|
|
|
|
|
{
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"value": "Harassment",
|
|
|
|
|
"description": "The intended effect of the incident was to pressure or intimidate the target."
|
2016-02-27 21:07:09 +01:00
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
"value": "ICS Control"
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
"value": "Traffic Diversion"
|
|
|
|
|
},
|
|
|
|
|
{
|
|
|
|
|
"value": "Unauthorized Access"
|
|
|
|
|
}
|
|
|
|
|
],
|
2017-07-25 17:39:06 +02:00
|
|
|
|
"version" : 2,
|
2016-02-27 21:07:09 +01:00
|
|
|
|
"description": "The IntendedEffectVocab is the default STIX vocabulary for expressing the intended effect of a threat actor",
|
2016-11-27 16:44:01 +01:00
|
|
|
|
"source": "STIX 1.0",
|
2017-07-25 17:39:06 +02:00
|
|
|
|
"author": ["STIX"],
|
2016-08-12 10:25:15 +02:00
|
|
|
|
"uuid": "b6975c96-296a-48cf-9006-034ed102bc85",
|
2016-02-28 08:21:02 +01:00
|
|
|
|
"stix": "1.2.1",
|
2016-02-27 21:07:09 +01:00
|
|
|
|
"type": "threat-actor-intended-effect-vocabulary"
|
|
|
|
|
}
|