STIX/TAXII - Complete Knowledge
What is STIX and what is TAXII? In the most simple terms STIX is a model of Threat Intelligence that is represented in motivations, abilities, capabilities and response objects. Those objects are then represented in either JSON (STIX 2) or XML (STIX 1).
Here is a very simple representation of STIX Objects in a graph. Explanation of the example
The data can be helpful for preventing or mitigating various kinds of attacks that can be expressed with STIX. All the list of the examples you can find in their official example page.
The STIX data has to be relayed in some way, that’s why we have the TAXII Server. It is a simple web server specifically created for storing and sharing that kind of data.
TAXII 1.x Structure
The TAXII 1.2 Server has the following structure:
- Discovery Service - Within a POST request to their discovery URL (which should be pointed by the Server maintainers).
- Collection Management URL - The service that has the collections with STIX objects.
- Channels - Push/Subscribe pattern.
The full list of features for TAXII1 can be found in their official documentation:
TAXII 2.x Structure
For the newer versions of the TAXII Server we have the following structure:
/discovery- Discovers the paths to the different services provided by the Server.
api_roots- Provides the API URLs for the different types of Collection Management.
collections- Provides the available collections for the given
collection/objects- Provides a list of STIX Objects in a given collection
You can see that this is very similar to the TAXII 1.x servers, there isn’t much of a difference in the structure besides that the
api_root in TAXII 2.x.
The full list of features for TAXII2 can be found in their official documentation.
TAXII Servers and Threat Intelligence Providers
The information about this is very scarce so I’ve gathered a quick list of the known providers for STIX data.
|Requires an account, provides data in various ways including a TAXII Server.
|Requires an account, Paid service, (consumes and provides) threat intel.
|Test TAXII (v1x) server. (quite unstable and inconsistent)
|Limo - Anomali
|Test TAXII (v1x/v2x) server. Somewhat unstable but mostly fine during tests.
Tools for STIX/TAXII
The main tool for creating/parsing or generating STIX data is going to be Python, since that all of the tools created are written in Python. Of course there are other alternatives but currently that’s the most common one.
Other tools that might come in handy.
|Translates STIX to various other Threat Intelligence formats such as Carbon Black Cloud Query and others
|The main python package to parse and use/create STIX2 data.
|Provides a validation for the STIX2 data, can be used to validate your data from your sources.
|Transforms STIX2 content to STIX1.2
|Transforms STIX1 data to STIX2.x
|The main python package for STIX1 data.
|Validating STIX1 data.
|Validator and Pattern Parser for STIX 2.x Patterns
|Python Client for TAXII 2 Servers
|Python Client for TAXII 1 Servers
Snippets and Gists
- https://gist.github.com/syrull/6a2614560fb0474df166a51bcb34990d (Creating a TAXII2 Client for LimoAnomali)
- https://gist.github.com/syrull/73b1798f90c4109a13ef9fceb1f2f858 (Creating a TAXII1 Client for OTXAlienVault)