Skip to main content
Version: latest

Relationship Types

Relationships

ATT&CK objects are interconnected through STIX relationship (STIX 2.0, STIX 2.1) objects that capture associations between groups, techniques, software, and other entities. These relationships enable analysis of adversary behaviors, defensive capabilities, and organizational structures within the ATT&CK framework.

Relationship objects frequently include description fields that provide contextual details about the specific association between objects.

Transitive relationships:

  • Groups can be considered indirect users of techniques employed by their software, creating a transitive relationship chain: intrusion-setusesmalware/toolusesattack-pattern.

  • Campaigns can also be considered indirect users of techniques employed by their software, creating a transitive relationship chain: campaignusesmalware/toolusesattack-pattern.

Uses

Procedures

Procedures describe specific instances of technique implementation by adversaries. Unlike other ATT&CK concepts, procedures are not represented by dedicated STIX Domain objects. Instead, they are modeled as STIX uses relationships where the target_ref points to a technique (attack-pattern).

Procedure details are captured in the relationship's description field

Source TypeRelationship TypeTarget TypeCustom Type?About
intrusion-setusesattack-patternNoGroup using a technique
malware or toolusesattack-patternNoSoftware using a technique
campaignusesattack-patternNoCampaign using a technique

Software usage

Not all STIX uses relationships are used to describe procedure relationships. Some uses relationships are used to describe software usage.

Source TypeRelationship TypeTarget TypeCustom Type?About
intrusion-setusesmalware or toolNoGroup using a software.
campaignusesmalware or toolNoCampaign using a software.

Mitigates

Mitigation mitigating technique.

Source TypeRelationship TypeTarget TypeCustom Type?
course-of-actionmitigatesattack-patternNo

Subtechnique-of

Sub-technique of a technique, where the source_ref is the sub-technique and the target_ref is the parent technique.

Source TypeRelationship TypeTarget TypeCustom Type?
attack-patternsubtechnique-ofattack-patternYes

Domain availability: Sub-techniques are available only in the Enterprise and Mobile domains.

Detects

Detection strategy for detecting a technique.

Source TypeRelationship TypeTarget TypeCustom Type?About
x-mitre-data-componentdetectsattack-patternYesDeprecated as of ATT&CK Specification 3.3.0. Data component detecting a technique. This relationship type will be removed in ATT&CK Specification 4.0.0.
x-mitre-detection-strategydetectsattack-patternYes

Attributed-to

Campaign attributed to a group.

Source TypeRelationship TypeTarget TypeCustom Type?
campaignattributed-tointrusion-setNo

Targets

Techniques target assets.

Source TypeRelationship TypeTarget TypeCustom Type?
attack-patterntargetsx-mitre-assetYes

Revoked-by

The target object is a replacement for the source object. Only occurs where the objects are of the same type, and the source object will have the property revoked = true.

Source TypeRelationship TypeTarget TypeCustom Type?
any typerevoked-byany typeYes