layout | title | categories |
---|---|---|
page |
Resources |
resources |
{: .table .table-hover .table-example .table-desc .table-col1-width} | :------: | ----------- | | CTI-TC Cover Page{: target="_blank"} | The list of current STIX and TAXII documents in Google Docs | | TC Roadmap{: target="_blank"} | Current roadmap items, their status, and their proposed release target |
HTML | Word | Description | |
---|---|---|---|
STIX 2.1 Specification | STIX 2.1 Specification | STIX 2.1 Specification | Defines concepts and structure of the STIX language, domain objects, relationship objects, cyber observable objects, and meta objects. Defines the patterning language to enable the detection of possibly malicious activity on networks and endpoints |
Note: This version of the specification is no longer a multipart document. Older STIX 2.1 documents can be found here
HTML | Word | Description | |
---|---|---|---|
TAXII 2.1 Specification | TAXII 2.1 Specification | TAXII 2.1 Specification | Defines the TAXII RESTful API and its resources along with the requirements for TAXII Client and Server implementations |
HTML | Word | Description | |
---|---|---|---|
TAXII 2.1 Interoperability Test Document Version 1.0 | TAXII 2.1 Interoperability Test Document Version 1.0 | TAXII 2.1 Interoperability Test Document Version 1.0 | This document provides detailed requirements on how product implementers within the threat intelligence ecosystem may demonstrate TAXII 2.1 interoperability compliance. |
STIX 2.1 Interoperability Test Document Version 1.0 | STIX 2.1 Interoperability Test Document Version 1.0 | STIX 2.1 Interoperability Test Document Version 1.0 | This document provides detailed requirements on how producers of products within the threat intelligence ecosystem may demonstrate STIX 2.1 interoperability compliance. |
HTML | Word | Description | |
---|---|---|---|
Part 1: STIX Core Concepts | Part 1: STIX Core Concepts | Part 1: STIX Core Concepts | Defines concepts that apply across all of STIX and defines the overall structure of the STIX language |
Part 2: STIX Objects | Part 2: STIX Objects | Part 2: STIX Objects | Defines the set of domain objects and relationship objects that STIX uses to represent cyber threat information |
Part 3: Cyber Observables Core Concepts | Part 3: Cyber Observables Core Concepts | Part 3: Cyber Observables Core Concepts | Defines concepts that apply across all of STIX Cyber Observables |
Part 4: Cyber Observable Objects | Part 4: Cyber Observable Objects | Part 4: Cyber Observable Objects | Defines a set of cyber observable objects that can be used in STIX and elsewhere |
Part 5: STIX Patterning | Part 5: STIX Patterning | Part 5: STIX Patterning | Defines a patterning language to enable the detection of possibly malicious activity on networks and endpoints |
HTML | Word | Description | |
---|---|---|---|
TAXII 2.0 Specification | TAXII 2.0 Specification | TAXII 2.0 Specification | Defines the TAXII RESTful API and its resources along with the requirements for TAXII Client and Server implementations |
HTML | Word | Description | |
---|---|---|---|
Part 1: STIX/TAXII 2.0 Interoperability Test Document | Part 1: STIX/TAXII 2.0 Interoperability Test Document | Part 1: STIX/TAXII 2.0 Interoperability Test Document | Document that provides detailed requirements on how producers of products within the threat intelligence ecosystem may demonstrate conformity with STIX/TAXII 2.0 if they wish to self-certify that their software is verified as interoperable |
Part 2: STIX/TAXII 2.0 Interoperability Test Document | Part 2: STIX/TAXII 2.0 Interoperability Test Document | Part 2: STIX/TAXII 2.0 Interoperability Test Document | Document that provides detailed requirements on how producers of products within the threat intelligence ecosystem may demonstrate conformity with STIX/TAXII 2.0 if they wish to self-certify that their software is verified as interoperable |
{: .table .table-hover .table-example .table-desc .table-col1-width}
Extension Name & Link | Extension Status | Extension Description |
---|---|---|
Incident{: target="_blank"} | Specification Track | Objects to allow tracking an incident across its lifecycle |
TLP 2.0{: target="_blank"} | External | Apply TLP 2.0 markings to STIX objects |
Malware Artifact{: target="_blank"} | Open | Capture malware artifacts |
Malware Behavior{: target="_blank"} | Open | Objects to capture malware behavior information, including objectives, behaviors, and methods |
ACS Data Markings{: target="_blank"} | External | Mark STIX objects using the Information Sharing Architecture (ISA) Access Control Specification (ACS) tagging specification |
Please submit a pull request or an issue to the cti-documentation{: target="_blank"} project, if you would like to have your open extension listed here.
More information about how extensions are developed and managed is available in the STIX Extensions Definition Policy.
OASIS CTI TC Open Repositories{: target="_blank"}
{: .table .table-hover .table-example .table-desc .table-col1-width} | :------: | ----------- | | cti-documentation{: target="_blank"} | GitHub Pages site for STIX and TAXII | | cti-pattern-matcher{: target="_blank"} | Match STIX content against STIX patterns | | cti-pattern-validator{: target="_blank"} | Validate patterns used to express Cyber Observable content in STIX Indicators | | cti-python-stix2{: target="_blank"} | Python APIs for STIX 2 | | cti-common-objects{: target="_blank"} | Collection of commonly used STIX 2.1 objects and extensions | | cti-stix-elevator{: target="_blank"} | Convert STIX 1 XML to STIX 2 JSON | | cti-stix-generator{: target="_blank"} | Tool for generating random STIX content for prototyping and testing | | cti-stix-slider{: target="_blank"} | Convert STIX 2 JSON to STIX 1 XML | | cti-stix-validator{: target="_blank"} | Validator for STIX 2 JSON normative requirements and best practices | | cti-stix-visualization{: target="_blank"} | Lightweight visualization for STIX 2 objects and relationships | | cti-stix2-json-schemas{: target="_blank"} | Non-normative STIX schemas and examples | | cti-taxii-client{: target="_blank"} | TAXII 2 Client Library Written in Python | | cti-taxii-server{: target="_blank"} | TAXII 2 Server Library Written in Python | | cti-training{: target="_blank"} | Collection of CTI-related training materials |
ARCHIVED OASIS CTI TC Repositories{: target="_blank"}
{: .table .table-hover .table-example .table-desc .table-col1-width} | :------: | ----------- | | cti-marking-prototype{: target="_blank"} | Prototype for processing granular data markings in STIX | | cti-sep-repository{: target="_blank"} | Collection of STIX Enhancement Proposals |
{: .table .table-hover .table-example .table-desc .table-col1-width} | :------: | ----------- | |FreeTAXII YouTube Channel{: target="_blank"}|Informational videos about STIX/TAXII - Not affiliated with OASIS| |STIX 2 Preferred Program{: target="_blank"}| Self-Certification Program for STIX/TAXII | |[Introduction to STIX]({{ site.baseurl }}/docs/Introduction_to_Structured_Threat_Information_Expression.pdf){: target="_blank"}| Brief intro to STIX and what it is used for | |[Introduction to TAXII]({{ site.baseurl }}/docs/Introduction_to_Trusted_Automated_eXchange_of_Intelligence_Information.pdf){: target="_blank"}| Brief intro to TAXII and what it is used for |