Enhancing STIX with High Value Target (HVT) Semantics
Structured Threat Information Expression (STIX) is the industry-standard language for representing and exchanging cyber threat intelligence in a structured, machine-readable way. It enables defenders, analysts, and security tools to share indicators, adversary behavior, attack patterns, and more in a consistent format that enhances automation and situational awareness. While STIX has long supported describing threat actor techniques, tools, and infrastructure, there is a gap in how legitimate software and operational tooling abused by adversaries is represented. This limits defenders’ ability to track target selection patterns, correlate observed exploitation of defensive assets, and model attack flows that leverage tool abuse as part of an adversary’s campaign logic.
Live Extension: HVT-Enhanced Tool SDO
The High Value Target (HVT) extension for the STIX Tool Domain Object (SDO) is a community-driven enhancement now available in the STIX extensions repository. It enriches the base STIX schema by enabling defenders and threat intelligence platforms to:
What This Enables
By integrating HVT concepts into STIX:
STIX Extensions and Specifications
This extension lives in the open STIX extension ecosystem and is intended for use by security tool vendors, CTI platforms, sharing communities, and research teams. STIX core standards and documentation remain maintained by the OASIS Cyber Threat Intelligence Technical Committee.
Live Extension: HVT-Enhanced Tool SDO
The High Value Target (HVT) extension for the STIX Tool Domain Object (SDO) is a community-driven enhancement now available in the STIX extensions repository. It enriches the base STIX schema by enabling defenders and threat intelligence platforms to:
- Represent software tools and services not just by function, but by their operational impact if abused
- Capture target-centric attributes that reflect adversary selection criteria (e.g., exposure, criticality, prevalence)
- Enable richer attack path modeling and correlation across threat reports, malware analysis, and incident telemetry
What This Enables
By integrating HVT concepts into STIX:
- Threat intelligence analysts can tag observations with target value attributes that reflect real-world attacker prioritization
- Sharing communities and automated systems can correlate tool usage with impact-oriented signals
- Exposure and defense planners can better quantify risk and impact pathways that adversaries exploit
- Red and blue teams can design scenarios that mirror how attackers reason about tool abuse and critical path disruption
STIX Extensions and Specifications
This extension lives in the open STIX extension ecosystem and is intended for use by security tool vendors, CTI platforms, sharing communities, and research teams. STIX core standards and documentation remain maintained by the OASIS Cyber Threat Intelligence Technical Committee.

