{"id":1576,"date":"2014-11-20T22:29:01","date_gmt":"2014-11-20T20:29:01","guid":{"rendered":"http:\/\/saisa.eu\/blogs\/Guidance\/?p=1576"},"modified":"2014-11-20T22:46:01","modified_gmt":"2014-11-20T20:46:01","slug":"stix-structured-threat-information-expression-by-mitre","status":"publish","type":"post","link":"https:\/\/saisa.eu\/blogs\/Guidance\/?p=1576","title":{"rendered":"STIX, Structured Threat Information eXpression, by Mitre"},"content":{"rendered":"<p>Structured Threat Information eXpression <a href=\"http:\/\/stix.mitre.org\/\">STIX<\/a> is a collaborative community-driven effort to define and develop a standardized language to represent structured cyber threat information.<\/p>\n<p><strong>STIX Use Cases<\/strong><\/p>\n<p><a href=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2014\/11\/stix-usecases.png\"><img loading=\"lazy\" alt=\"STIX-usecases\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2014\/11\/stix-usecases-small.png\" width=\"550\" height=\"318\" \/><\/a><\/p>\n<p><strong>STIX sample<\/strong><\/p>\n<p>This is from the <a href=\"http:\/\/stix.mitre.org\/about\/documents\/Training_Materials_STIX-TAXII_Training_Class_April2014.zip\">training material<\/a>.<\/p>\n<blockquote>\n<p><a href=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2014\/11\/stix-sample.png\"><img loading=\"lazy\" alt=\"STIX-sample\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2014\/11\/stix-sample-small.png\" width=\"450\" height=\"329\" \/><\/a><\/p>\n<\/blockquote>\n<p>From samples <a href=\"https:\/\/stix.mitre.org\/language\/version1.1.1\/samples.html\">page<\/a>:<\/p>\n<blockquote>\n<\/blockquote>\n<p><strong>STIX Tree Viewer<\/strong><\/p>\n<p>One can use the tool STIX Tree Viewer from the training package.<br \/>\nSee <a href=\"http:\/\/stix.mitre.org\/about\/documents\/Training_Materials_STIX-TAXII_Training_Class_April2014.zip\">training material<\/a> download on their training <a href=\"http:\/\/stix.mitre.org\/training\/index.html\">page<\/a>.<br \/>\nStixViz.exe is included in the directory .\\stix-taxii-workshop\\stix\\stix-viz<\/p>\n<blockquote>\n<p><a href=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2014\/11\/stix-viewer.png\"><img loading=\"lazy\" alt=\"STIX-viewer\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2014\/11\/stix-viewer-small.png\" width=\"450\" height=\"129\" \/><\/a><\/p>\n<\/blockquote>\n<p>In the example below, 2 files were selected from the .\\stix-taxii-workshop\\stix\\samples directory.<\/p>\n<blockquote>\n<p><a href=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2014\/11\/stix-tree-view.png\"><img loading=\"lazy\" alt=\"STIX-tree-view\" src=\"http:\/\/saisa.eu\/blogs\/Guidance\/wp-content\/uploads\/2014\/11\/stix-tree-view-small.png\" width=\"550\" height=\"367\" \/><\/a><\/p>\n<\/blockquote>\n<p><strong>from <a href=\"https:\/\/stix.mitre.org\/about\/faqs.html\">FAQ<\/a><\/strong><\/p>\n<p>C2. What is the relationship between STIX and CybOX?<\/p>\n<blockquote>\n<p>STIX uses the Cyber Observable eXpression (CybOX\u2122) language to describe cyber Observables. The CybOX schema is natively imported and used within STIX to characterize system and network events, characteristics, and behaviors observed within the operational domain.<\/p>\n<\/blockquote>\n<p>C5. What is the relationship between STIX and OpenIOC?<\/p>\n<blockquote>\n<p>STIX Indicators can convey non-standard Indicator patterns in formats other than CybOX using the Test_Mechanism structure. Each format must be implemented as an extension of the Test_Mechanism extension point. STIX provides a default extension for Mandiant\u2019s Open Indicators of Compromise (OpenIOC) as well as extensions for the Open Vulnerability and Assessment Language (OVAL\u00c2\u00c2\u00ae), SNORT rules, and YARA rules.<\/p>\n<\/blockquote>\n<p><strong>Other links<\/strong><\/p>\n<ul>\n<li><a href=\"http:\/\/cybox.mitre.org\/\">CybOX<\/a> Cyber Observable eXpression\n<ul>\n<li>standardized schema for the specification, capture, characterization, and communication of events or stateful properties that are observable in the operational domain<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"https:\/\/www.iocbucket.com\/\">IOC Bucket<\/a>\n<ul>\n<li>shared IOCs<\/li>\n<\/ul>\n<\/li>\n<li><a href=\"http:\/\/taxii.mitre.org\/\">TAXII<\/a> Trusted Automated eXchange of Indicator Information (TAXII) is the main transport mechanism for cyber threat information represented as STIX<\/li>\n<li>blog &#8220;<a href=\"http:\/\/saisa.eu\/blogs\/Guidance\/?p=1565\">Indicators of Compromise, OpenIOC and CyBOX<\/a> &#8220;<\/li>\n<li><a href=\"http:\/\/stixproject.github.io\/documentation\/idioms\/incident-vs-indicator\/\">Incident vs. Indicator<\/a><\/li>\n<\/ul>\n","protected":false},"excerpt":{"rendered":"<p>Structured Threat Information eXpression STIX is a collaborative community-driven effort to define and develop a standardized language to represent structured cyber threat information. STIX Use Cases STIX sample This is from the training material. From samples page: STIX Tree Viewer &hellip; <a href=\"https:\/\/saisa.eu\/blogs\/Guidance\/?p=1576\">Continue reading <span class=\"meta-nav\">&rarr;<\/span><\/a><\/p>\n","protected":false},"author":2,"featured_media":0,"comment_status":"open","ping_status":"closed","sticky":false,"template":"","format":"standard","meta":[],"categories":[24,29,73,26,47],"tags":[],"_links":{"self":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1576"}],"collection":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcomments&post=1576"}],"version-history":[{"count":5,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1576\/revisions"}],"predecessor-version":[{"id":1581,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=\/wp\/v2\/posts\/1576\/revisions\/1581"}],"wp:attachment":[{"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fmedia&parent=1576"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Fcategories&post=1576"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/saisa.eu\/blogs\/Guidance\/index.php?rest_route=%2Fwp%2Fv2%2Ftags&post=1576"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}