From 22c551e4853edec0478a6b1cf86c0e8c3a9e90e8 Mon Sep 17 00:00:00 2001 From: Emily Ratliff Date: Mon, 23 Oct 2023 11:56:30 -0500 Subject: [PATCH] remove the trademark symbols --- faq.md | 30 +++++++++++++++--------------- index.md | 8 ++++---- stix/compare.md | 38 +++++++++++++++++++------------------- stix/intro.md | 2 +- taxii/intro.md | 2 +- 5 files changed, 40 insertions(+), 40 deletions(-) diff --git a/faq.md b/faq.md index 5251401..0cbffaa 100644 --- a/faq.md +++ b/faq.md @@ -17,24 +17,24 @@ Frequently Asked Questions ## General ## -### What is STIX™? ### +### What is STIX? ### STIX — the Structured Threat Information eXpression — is a language and serialization format used to exchange cyber threat intelligence (CTI). STIX enables organizations to share CTI with one another in a consistent and machine-readable manner, allowing security communities to better understand what computer-based attacks they are likely to see and to better prepare for and/or respond to those attacks faster and more effectively. STIX is designed to improve many different capabilities, such as collaborative threat analysis, automated threat exchange, automated detection and response, and more. -### What is TAXII™? ### +### What is TAXII? ### TAXII — the Trusted Automated Exchange of Intelligence Information — is an application layer protocol for the communication of CTI in a simple and scalable manner over HTTPS. TAXII enables organizations to share CTI by defining a standard API that aligns with common sharing models. TAXII is specifically designed to support the exchange of CTI represented in STIX. -### Who controls STIX™ and TAXII™? ### +### Who controls STIX and TAXII? ### The STIX and TAXII standards are governed by the OASIS Cyber Threat Intelligence Technical Committee (CTI TC). STIX and TAXII were created in 2012 under the auspices of the US Department of Homeland Security. In June of 2015, DHS licensed all of the intellectual property and trademarks associated with STIX and TAXII to OASIS, a nonprofit consortium that drives the development, convergence and adoption of open standards for the global information society. -### What are the current versions of STIX™ and TAXII™? ### +### What are the current versions of STIX and TAXII? ### In 2021, OASIS approved STIX 2.1 and TAXII 2.1 as OASIS Standards. See the [Resources]({{ site.baseurl }}/resources) page for links to the latest specs. -Looking for information about STIX 1? See [The Transition to STIX™/TAXII™ 2]({{ site.baseurl }}/stix/compare) +Looking for information about STIX 1? See [The Transition to STIX/TAXII 2]({{ site.baseurl }}/stix/compare) -### Are there “real-world” examples of STIX™ 2 content I can look at? ### +### Are there “real-world” examples of STIX 2 content I can look at? ### There are two example threat reports in the [CTI STIX2 JSON Schemas repository](https://github.com/oasis-open/cti-stix2-json-schemas/tree/master/examples/threat-reports). @@ -44,13 +44,13 @@ Many threat intelligence providers offer their intelligence in the STIX format. Finally, there are several examples in the [Examples]({{ site.baseurl }}/stix/examples) section of this site. -### Are there APIs and Tools for STIX™ and TAXII™ 2? ### +### Are there APIs and Tools for STIX and TAXII 2? ### Yes, see the Github repositories for the [CTI TC open repositories](https://github.com/oasis-open?utf8=%E2%9C%93&q=cti-&type=&language=). The list of repositories on the [Resources]({{ site.baseurl }}/resources) page contains direct links to useful tools. -### How do I verify my software is STIX™/TAXII™ 2 interoperable? ### +### How do I verify my software is STIX/TAXII 2 interoperable? ### The Interoperability Subcommittee of the CTI TC has developed a 2-Part Committee Note that establishes a step-by-step guide to a self-certification process for various personas. Once a Producer of STIX feeds content, a vendor providing a Threat Intelligence Platform (TIP), a vendor providing a Security Incident and Event Management (SIEM) tool, a vendor that provides threat mitigation systems (TMS), or a vendor that provides threat detection systems (TDS) executes the steps outlined, demonstrates successful interoperability, and documents such, that supplier may submit a statement to OASIS testifying to the self-certification. We are using TMS to refer to tools such as firewalls and intrusion prevention systems. We are using TDS to refer to tools such as intrusion detection software and web proxies. @@ -58,16 +58,16 @@ The self-certification process is intended to be policed by market forces. If a The vendor or supplier will need to re-test the attested product and submit documentation as per the Interoperability Specification to once again achieve listing on the interoperability list. -See the [Resources]({{ site.baseurl }}/resources) page for direct links to the STIX™ and TAXII™ Interoperability specifications. +See the [Resources]({{ site.baseurl }}/resources) page for direct links to the STIX and TAXII Interoperability specifications. -### I'm implementing STIX™ and/or TAXII™ 2 and I have a question about something in the specification. What should I do? ### +### I'm implementing STIX and/or TAXII 2 and I have a question about something in the specification. What should I do? ### We have a very active and supportive community. If you post your question on CTI Users List you will likely receive a response from one of our community members. Email cti-users at lists.oasis-open.org or file an issue in the [CTI TC's repository](https://github.com/oasis-tcs/cti-stix2/issues) on Github. -## STIX™ 2 Core Design Principles ## +## STIX 2 Core Design Principles ## -### What are the core design principles of STIX™ 2? ### +### What are the core design principles of STIX 2? ### - Flatter is better than nested - Only one way to do something @@ -76,7 +76,7 @@ Email cti-users at lists.oasis-open.org or file an issue in the [CTI TC's reposi - It’s easier to add objects and properties than it is to take them away - It's easier to make a required property optional later than to make an optional property required. -### What are the criteria for adding a new STIX™ Domain Object (SDO)? ### +### What are the criteria for adding a new STIX Domain Object (SDO)? ### SDOs are used to represent independent concepts. An item becomes an SDO when it is expected to evolve on its own outside the context of any other objects. In other cases, objects become SDOs when there are multiple relationships between it and other SDOs, when a third-party needs to add relationships to/from that SDO and other SDOs, and when you need to express confidence on the object separately from the other objects it might be embedded in. New SDOs should be proposed as extension objects and may be submitted to the CTI Common Objects repository for development and testing. @@ -87,7 +87,7 @@ External relationships (represented using an SRO) are used whenever third-partie Embedded relationships (represented using a property in an object with the ID of another object) are used when the relationship is a fact about the object. For example, the Producer that created an indicator is not up for debate; it's definitely from a particular Producer and they know that they created the SDO. Similarly, the contents of a Report are what they are. If later on it's determined that the Report should have different contents, it can be updated by the original Producer, but applying confidence or allowing third parties to arbitrarily add new objects to an existing Report doesn't make sense. -## Specific STIX™ 2 Design Decisions ## +## Specific STIX 2 Design Decisions ## ### When are IDs in UUIDv4 format vs UUIDv5? ### First, to explain the differences between UUIDv4 and UUIDv5: @@ -123,7 +123,7 @@ In STIX 2.1, after much discussion, STIX Cyber Observerable Objects (SCOs) were It is still possible to represent Cyber-observable Objects using the method described for STIX 2.0, but this method has been deprecated. -### Why are there stub objects in STIX™ 2.0 and 2.1? ### +### Why are there stub objects in STIX 2.0 and 2.1? ### The stub objects in STIX 2.0 (COA and Malware) and STIX 2.1 (Incident) were designed to capture basic unstructured data and serve as a placeholder for future enhancements. For example, the Malware stub can be used to provide malware names and descriptions in STIX 2.0 (useful for high-level threat intel and IOC sharing) but does not have capabilities to represent malware analysis data. Marking them as stub objects was intended to clearly demonstrate that these objects are not complete (due to time and resource constraints) and will be enhanced in future releases of STIX. diff --git a/index.md b/index.md index a5840a9..0d917ce 100644 --- a/index.md +++ b/index.md @@ -12,12 +12,12 @@ layout: default
-
[![STIX Logo]({{ site.baseurl }}/img/LOGO_STIX.svg){: .panel-logo}]({{site.baseurl}}/stix/intro)
+
[![STIX Logo]({{ site.baseurl }}/img/STIX-logo.png){: .panel-logo}]({{site.baseurl}}/stix/intro)
A structured language for cyber threat intelligence

- Structured Threat Information Expression (STIX™) is a language and serialization format used to exchange cyber threat intelligence (CTI). + Structured Threat Information Expression (STIX) is a language and serialization format used to exchange cyber threat intelligence (CTI).

STIX enables organizations to share CTI with one another in a consistent and machine readable manner, allowing security communities to better understand what computer-based attacks they are most likely to see and to anticipate and/or respond to those attacks faster and more effectively. @@ -42,12 +42,12 @@ layout: default

-
[![TAXII Logo]({{ site.baseurl }}/img/LOGO_TAXII.svg){: .panel-logo}]({{site.baseurl}}/taxii/intro)
+
[![TAXII Logo]({{ site.baseurl }}/img/TAXII-logo.png){: .panel-logo}]({{site.baseurl}}/taxii/intro)
A transport mechanism for sharing cyber threat intelligence

- Trusted Automated Exchange of Intelligence Information (TAXII™) is an application layer protocol for the communication of cyber threat information in a simple and scalable manner. + Trusted Automated Exchange of Intelligence Information (TAXII) is an application layer protocol for the communication of cyber threat information in a simple and scalable manner.

TAXII is a protocol used to exchange cyber threat intelligence (CTI) over HTTPS. TAXII enables organizations to share CTI by defining an API that aligns with common sharing models. diff --git a/stix/compare.md b/stix/compare.md index 5fbc27d..eb5acb5 100644 --- a/stix/compare.md +++ b/stix/compare.md @@ -5,28 +5,28 @@ short_title: Comparing STIX 1 and 2 categories: stix --- -## The Transition to STIX™/TAXII™ 2 ## +## The Transition to STIX/TAXII 2 ## -### Why were new versions of STIX™ and TAXII™ created? ### +### Why were new versions of STIX and TAXII created? ### While STIX and TAXII 1 have been widely adopted and deployed around the world by operational sharing communities, the CTI TC recognized that these specifications were difficult to implement. The primary sources of that difficulty were excessive complexity in certain advanced XML constructs (e.g., XSI types) and the choice of XML as a representation. The community also learned that having multiple ways of doing things and excessive optionality in the data model led to differences in data-modelling and challenges in interoperability. As a result the CTI TC decided to rework the data model and serialization for STIX 2. Similarly, armed with the lessons learned over the years the community made the decision to rework TAXII as an HTTP Representational State Transfer (RESTful) based design. ### One Standard ### -In 2016, the OASIS Cyber Threat Intelligence (CTI) Technical Committee (TC) decided to merge the STIX and Cyber Observable eXpression (CybOX™) specifications into one. CybOX objects are now called STIX Cyber Observables. +In 2016, the OASIS Cyber Threat Intelligence (CTI) Technical Committee (TC) decided to merge the STIX and Cyber Observable eXpression (CybOX) specifications into one. CybOX objects are now called STIX Cyber Observables. Now when you discuss “STIX”, you are talking about the one standard needed for sharing cyber threat intelligence! -## STIX™ 1 vs STIX™ 2 Frequently Asked Questions +## STIX 1 vs STIX 2 Frequently Asked Questions -### What are the key differences between STIX™ 1 and STIX™ 2? ### +### What are the key differences between STIX 1 and STIX 2? ### - JSON vs. XML Whereas STIX 1 was serialized using eXtensible Mark-up Language (XML), STIX 2 specifies JavaScript Object Notation (JSON) as the “Mandatory To Implement” (MTI) serialization, i.e. it requires implementations to, at a minimum, [support JSON serialization](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_vj2dopx186bb). Though both XML and JSON have their own benefits, the CTI TC determined that JSON was more lightweight, preferred by most developers, and easier to understand while being sufficient to express the semantics of STIX. -- STIX™ Domain Objects +- STIX Domain Objects STIX 1 allowed certain objects to be defined within other objects (e.g., a TTP could be defined within an Indicator) in addition to being defined outside any other object (i.e., at the “top-level” of a STIX document). In STIX 2, all objects in STIX 2.x are [at the top-level](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_nrhq5e9nylke), rather than being embedded in other objects. This change simplifies the parsing and storage of STIX 2 objects. @@ -95,7 +95,7 @@ During the development of the STIX 2 SDOs the community felt that the generic TT
-- STIX™ Cyber-observable Objects +- STIX Cyber-observable Objects STIX 2.1 defines cyber observable object at the top-level, as opposed to STIX 1 and 2.0. In STIX 1, every CybOX object needed to be wrapped in an Observable object. Similarly in STIX 2.0, a cyber observable needed to be wrapped in an Observed Data object. This made it difficult to defined a cyber observable just once (e.g., an IPv4 address) and use it in many different contexts. This is possible with the introduction of [STIX Cyber-Observable Objects (SCOs)](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_mlbmudhl16lr). @@ -132,7 +132,7 @@ STIX 2.1 defines cyber observable object at the top-level, as opposed to STIX 1
-There are fewer objects in STIX™ 2 than in CybOX 2.1. For STIX 2, the community focused on developing objects that saw significant usage in practice. Many CybOX objects were defined but never (or rarely) used. If there is a need for additional SCOs, they can be added in a future release or via extensions. +There are fewer objects in STIX 2 than in CybOX 2.1. For STIX 2, the community focused on developing objects that saw significant usage in practice. Many CybOX objects were defined but never (or rarely) used. If there is a need for additional SCOs, they can be added in a future release or via extensions. - Relationships as Top-Level Objects @@ -174,7 +174,7 @@ It is understood that certain communities will need to exchange data not defined As part of the move from XML to JSON, [data markings](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_95gfoglikdzh) no longer use XPath. In STIX 2, there are two types of data markings: object markings – applicable to an entire object, and granular markings – applicable to one or more object properties within a single object. In order to clarify the semantics of markings, all objects must be marked individually - there is no inheritance of markings in STIX 2. -- STIX™ Patterning Language +- STIX Patterning Language Indicator patterns in STIX 1 were an area where the "many ways of expressing semantically-equivalent content" problem was particularly manifested. As a result, for a consumer of STIX 1 content, rigorously parsing all but the simplest patterns was unnecessarily difficult. STIX 2 takes a radically different approach by defining a human-readable, SQL-like Indicator [Patterning Language](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_e8slinrhxcc9), which is independent of the serialization language. Indicator patterns in STIX 1.x were expressed using XML syntax. This made all but the simplest patterns difficult to create and to understand. As a result, patterns written in the STIX Patterning Language are more compact and far easier to read. @@ -240,7 +240,7 @@ Indicator patterns in STIX 1 were an area where the "many ways of expressing sem In STIX 1, the duality between Observations and Patterns (i.e., a pattern was essentially an observation with an operator) was a point of confusion for many end users. STIX 2 resolves this issue by having a separate pattern construct that uses its own language (see above) and is a property of an Indicator object instead of a top-level object. Accordingly, there is no semantic overlap in STIX 2 between the specification of observations using the Observed Data object and patterns via the Indicator object, as these entities were designed to be distinct. -### What are the key differences between STIX™ 2.0 and STIX™ 2.1? ### +### What are the key differences between STIX 2.0 and STIX 2.1? ### STIX 2.1 differs from STIX 2.0 in the following ways: @@ -255,7 +255,7 @@ STIX 2.1 differs from STIX 2.0 in the following ways: - Added STIX Extension mechanisms and deprecated custom properties, objects, and extensions. -### STIX™ 1 had XML Namespaces. Is there something similar in STIX™ 2? ### +### STIX 1 had XML Namespaces. Is there something similar in STIX 2? ### STIX 1 made use of XML namespaces for two purposes: @@ -265,19 +265,19 @@ While it is common practice for XML content to make use of namespaces, most JSON STIX 2 uses a property, created_by_ref, to replace the second usage of namespaces. In other words, in STIX 1 you would examine the namespace of an ID attribute value on an object to determine who created it, while in STIX 2 you look in the created_by_ref property. -### What happened to CybOX™? ### +### What happened to CybOX? ### During the design and development of STIX 2, the CTI TC concluded that due to the tightly-coupled nature of STIX and the Cyber Observable eXpression (CybOX) language that CybOX should be merged into STIX. These objects are now characterized as Cyber Observable objects within STIX and are defined in the STIX specification. The TC felt that it would be easier for the market to understand and adopt STIX if it was a single standard. This consolidation eliminated the need for a complex interoperability matrix between the two standards. -### I was using a CybOX™ object before, but now I can't find it, what should I do? ### +### I was using a CybOX object before, but now I can't find it, what should I do? ### If you were using a CybOX object and it's not a part of STIX 2, let us know! Create the object as a STIX 2.1 Extension and submit it to the [CTI STIX Common Object repository](https://github.com/oasis-open/cti-stix-common-objects) to give it greater visibility. If you're a TC member, post to the cti-cybox@lists.oasis-open.org list. If you're not, post to cti-comment@lists.oasis-open.org (instructions here: https://www.oasis-open.org/committees/comments/index.php?wg_abbrev=cti). -### What are the key differences between TAXII™ 1 and TAXII™ 2? ### +### What are the key differences between TAXII 1 and TAXII 2? ### - HTTPS as the Transport Protocol @@ -287,11 +287,11 @@ TAXII 1 was designed to the TAXII application protocol to be hosted on top of mu TAXII 2 provides a RESTful interface to data and services. RESTful is an architectural style for networked hypermedia applications; it is primarily used to build Web services that are lightweight, maintainable, and scalable. RESTful is not dependent on any protocol, but almost every RESTful service uses HTTP as its underlying protocol. As is noted above, TAXII 2 is built on top of HTTPS the secure HTTP analogue. -### Are there tools to help me migrate between STIX™ 1 and STIX™ 2? ### +### Are there tools to help me migrate between STIX 1 and STIX 2? ### Yes. The [STIX Elevator](https://github.com/oasis-open/cti-stix-elevator) does a best-effort conversion of STIX 1 content into STIX 2. The [STIX Slider](https://github.com/oasis-open/cti-stix-elevator) converts STIX 2 to STIX 1. -### What are the latest versions of STIX™ and TAXII™ 1? ### +### What are the latest versions of STIX and TAXII 1? ### The most recent (and final) version of the STIX 1 specifications is STIX 1.2.1, the specifications can be found here: http://docs.oasis-open.org/cti/stix/v1.2.1/stix-v1.2.1-part1-overview.html @@ -299,11 +299,11 @@ The most recent (and final) version of the TAXII 1 specifications is TAXII 1.1.1 Additional documentation can be found at stix.mitre.org. -### Will there be any further revisions of STIX™ 1.2.1, CybOX™ 2.1.1, or TAXII™ 1.1.1? ### +### Will there be any further revisions of STIX 1.2.1, CybOX 2.1.1, or TAXII 1.1.1? ### No. The CTI TC community will be focusing on advancing STIX and TAXII 2+. However, OASIS rules ensure that all OASIS specifications are available in perpetuity and therefore STIX 1.2.1, CybOX 2.1.1, and TAXII 1.1.1 will remain available to anyone who wishes to use them. -### What is happening with all of the tools and APIs that MITRE built for STIX™ 1, CybOX™ 2, and TAXII™ 1? ### +### What is happening with all of the tools and APIs that MITRE built for STIX 1, CybOX 2, and TAXII 1? ### -The tools and APIs that MITRE built for STIX™ 1, CybOX™ 2, and TAXII™ 1 remain available on Github, but have been deemed end-of-life. Users are encouraged to update to STIX 2.1. In case of a small bug fix or emergency security update, MITRE may update the tools at their discretion. Please contact MITRE directly for assistance. +The tools and APIs that MITRE built for STIX 1, CybOX 2, and TAXII 1 remain available on Github, but have been deemed end-of-life. Users are encouraged to update to STIX 2.1. In case of a small bug fix or emergency security update, MITRE may update the tools at their discretion. Please contact MITRE directly for assistance. diff --git a/stix/intro.md b/stix/intro.md index b9cd90f..cd333d4 100644 --- a/stix/intro.md +++ b/stix/intro.md @@ -5,7 +5,7 @@ categories: stix --- ## What is STIX? -Structured Threat Information Expression (STIX™) is a language and serialization format used to exchange cyber threat intelligence (CTI). STIX is open source and free allowing those interested to [contribute]({{ site.baseurl }}/contribute) and [ask questions]({{ site.baseurl }}/faq) freely. +Structured Threat Information Expression (STIX) is a language and serialization format used to exchange cyber threat intelligence (CTI). STIX is open source and free allowing those interested to [contribute]({{ site.baseurl }}/contribute) and [ask questions]({{ site.baseurl }}/faq) freely. ## Why should you care? diff --git a/taxii/intro.md b/taxii/intro.md index 45fbca5..349c6d5 100644 --- a/taxii/intro.md +++ b/taxii/intro.md @@ -4,7 +4,7 @@ title: Introduction to TAXII categories: taxii --- -Trusted Automated Exchange of Intelligence Information (TAXII™) is an application protocol for exchanging CTI over HTTPS. ​TAXII defines a RESTful API (a set of services and message exchanges) and a set of requirements for TAXII Clients and Servers. As depicted below, TAXII defines two primary services to support a variety of common sharing models: +Trusted Automated Exchange of Intelligence Information (TAXII) is an application protocol for exchanging CTI over HTTPS. ​TAXII defines a RESTful API (a set of services and message exchanges) and a set of requirements for TAXII Clients and Servers. As depicted below, TAXII defines two primary services to support a variety of common sharing models: - **Collection** - A Collection is an interface to a logical repository of CTI objects provided by a TAXII Server that allows a producer to host a set of CTI data that can be requested by consumers: TAXII Clients and Servers exchange information in a request-response model.