Page Index - STIXProject/use-cases GitHub Wiki
141 page(s) in this GitHub Wiki:
- Home
- High Level Use cases identified for STIX include:
- Detailed Use cases identified for STIX include:
- To propose a new use case please:
- Use case title (replace with your title)
- Asserting Data Markings on Content
- Incident Recovery
- Incident Response
- New use case template (cut and paste this content into your new use case wiki page then flesh out)
- Proposing New Use Cases
- Use Case: Analyzing Cyber Threats
- Use Case: Analyzing Cyber Threats in Real Time Machine to Human
- Use Case: Anonymized Indicator Sighting Reporting
- Use Case: Asserting Relationships Between Content
- Use Case: Asset Risk Analysis
- Use Case: Asset Risk Characterization
- Use Case: Attack Infrastructure Analysis and Characterization
- Use Case: Attack Infrastructure Attribution Analysis
- Use Case: Attack Infrastructure Characterization
- Use Case: Attack Infrastructure Comparative Analysis
- Use Case: Attack Infrastructure Family Lineage Analysis
- Use Case: Attack Pattern Analysis and Characterization
- Use Case: Attack Pattern Comparative Analysis
- Use Case: Attack Tool Analysis and Characterization
- Use Case: Attack Tool Attribution Analysis
- Use Case: Attack Tool Characterization
- Use Case: Attack Tool Comparative Analysis
- Use Case: Attack Tool Family Lineage Analysis
- Use Case: Attacker Persona Analysis and Characterization
- Use Case: Attribution Analysis
- Use Case: Automated COA Deployment
- Use Case: Automated COA Selection
- Use Case: Automated COA Transformation
- Use Case: Campaign Analysis
- Use Case: Campaign Attribution Analysis
- Use Case: Campaign Incident Mapping Analysis
- Use Case: Campaign Motivation Analysis
- Use Case: Campaign TTP Mapping Analysis
- Use Case: Campaign Victim Targeting Analysis
- Use Case: CES 21 MMATRS project
- Use Case: COA Analysis
- Use Case: COA Characterization
- Use Case: COA Mapping to Purpose
- Use Case: COA Selection
- Use Case: COA Structured Characterization
- Use Case: Collaborative Malware Analysis
- Use Case: Configuration Characterization
- Use Case: Content Comparative Analysis
- Use Case: Create New Content
- Use Case: CTI Report Scoping and Aggregation
- Use Case: Cyber Breach Analysis and Categorization
- Use Case: Cyber Incident Breach Reporting
- Use Case: Cyber Threat Detection
- Use Case: Cyber Threat Indicator Sharing
- Use Case: Cyber Threat Prevention
- Use Case: Exploit Analysis and Characterization
- Use Case: Exploit Reverse Engineering
- Use Case: Exploit Target Analysis
- Use Case: Exploit Target Susceptibility Analysis
- Use Case: Holistic Threat Intelligence Report Sharing
- Use Case: Identifying Duplicate Content
- Use Case: Identifying Exact Duplicate Content from a different Producer
- Use Case: Identifying Exact Duplicate Content from the Same Producer
- Use Case: Identifying Partially Duplicate Content
- Use Case: Identifying Relationships between Content
- Use Case: Incident Analysis
- Use Case: Incident Attribution
- Use Case: Incident Attribution Analysis
- Use Case: Incident Categorization Analysis
- Use Case: Incident Comparative Analysis
- Use Case: Incident Impact Assessment
- Use Case: Incident Indicator Analysis
- Use Case: Incident Response
- Use Case: Incident Timeline Analysis
- Use Case: Incident TTP Analysis
- Use Case: Incident Victim Targeting Analysis
- Use Case: Indicator Analysis
- Use Case: Indicator Comparative Analysis
- Use Case: Indicator Composition Analysis
- Use Case: Indicator Deduplication
- Use Case: Indicator Duplication Identification
- Use Case: Indicator Efficacy Analysis
- Use Case: Indicator Extraction
- Use Case: Indicator Extraction from CTI
- Use Case: Indicator Extraction from Digital Forensics Analysis
- Use Case: Indicator Extraction from Malware Analysis
- Use Case: Indicator Extraction from Sensor or Log Data
- Use Case: Indicator Sighting Analysis
- Use Case: Indicator Sighting Reporting
- Use Case: Indicator Sighting Reporting with Count
- Use Case: Indicator Sighting Reporting with Specific Observation
- Use Case: Indicator to KillChain Mapping Analysis
- Use Case: Intended Effect Analysis
- Use Case: Kill Chain Analysis
- Use Case: Kill Chain Characterization
- Use Case: Kill Chain Temporal Analysis
- Use Case: Malware Analysis and Characterization
- Use Case: Malware Analysis Sharing
- Use Case: Malware Behavioral Analysis
- Use Case: Malware Comparative Analysis
- Use Case: Malware Family Lineage Analysis
- Use Case: Malware Reverse Engineering
- Use Case: Malware Structural Analysis
- Use Case: Management of Content Over Time
- Use Case: Management of Content Sharing Over Time
- Use Case: Managing Content Control
- Use Case: Managing Cyber Threat Response Activities
- Use Case: Managing Situational Awareness
- Use Case: Negotiation Agreement on Technical Factors for Cyber Threat Information Exchange
- Use Case: Prioritizing Cyber Threats
- Use Case: Publish Content
- Use Case: Qualifying Asserted Relationship Confidence
- Use Case: Receive Content
- Use Case: Reshare Content
- Use Case: Security Tool Integration
- Use Case: Share Cyber Threat Information
- Use Case: Shared Content Source Assessment
- Use Case: Sighting Analysis
- Use Case: Simple Indicator Sighting Reporting ( 1)
- Use Case: Specifying Indicator Patterns for Cyber Threats
- Use Case: Threat Actor Capability Analysis
- Use Case: Threat Actor Characterization
- Use Case: Threat Actor Identity Analysis
- Use Case: Threat Actor Kill Chain Analysis
- Use Case: Threat Actor Modus Operandi Analysis
- Use Case: Threat Actor Motivation Analysis
- Use Case: Threat Actor Predictive Intent Analysis
- Use Case: TTP Analysis
- Use Case: TTP Exploit Targeting Analysis and Characterization
- Use Case: TTP Targeted Configuration Identification
- Use Case: TTP Targeted Vulnerability Identification
- Use Case: TTP Targeted Weakness Identification
- Use Case: TTP to KillChain Mapping Analysis
- Use Case: Update Content
- Use Case: Victim Targeting Analysis and Characterization
- Use Case: Victim Targeting by Identity Characterization
- Use Case: Victim Targeting by Information Type Characterization
- Use Case: Victim Targeting by System Type Characterization
- Use Case: Victim Targeting by Technical Context Characterization
- Use Case: Vulnerability Characterization
- Use Case: Weakness Characterization