-
Notifications
You must be signed in to change notification settings - Fork 11
Home
Seamless Threat Intelligence Platform enables better incident response and information sharing, which brings down barriers between separate practices of CTI sharing.
S-TIP is built around a very simple, but extremely powerful concept - Convert whatever CTI into a STIX file or a set of STIX files, send them around, and create different views dynamically from those STIX files.
- STIX 1.1/1.2/2.0/2.1
- TAXII 1.1/2.0/2.1 Client and TAXII 1.1/2.1 Server
S-TIP consists of four main modules,
- Common
- RS
- SNS
- GV
and two optional modules for TAXII 1.1 and 2.1 Servers.
- TXS (TAXII 1.1 Server)
- TXS2 (TAXII 2.1 Server)
This article explains the four main modules. The following figure shows how those modules are organized to form S-TIP as a whole.
Common hosts common functionalities for other S-TIP modules
RS is the store and transport hub of STIX files. It uses MongoDB to store STIX 1.x and STIX 2.x data. RS serves as a TAXII client. RS as a TAXII client can connect to TAXII servers to download STIX files. (RS also serves as TAXII server with using opentaxii.)
- AlienVault OTX
- MISP
- iSIGHT Partners
S-TIP TAXII Client supports for receiving STIX from DHS AIS (Automated Indicator Sharing) program.
See the REST API.
SNS provides a social media interface for human users. It uses bootcamp internally.
Important to note is that there are both Human CTI and System CTI in the same timeline.
User creates a new post with Title/Content/Attachment files(e.g. CSV of indicators)/TLP/Sharing Range. The post is automatically converted to a STIX file and accumulated into RS.
S-TIP tries to extract IoCs and other elements like CVEs from the post and its attachments. Currently, it extracts
- Domain names
- Email addresses
- File names
- IPv4 addresses
- MD5/SHA1/SHA256/SHA512/ hash values
- URLs
The TLP (Red/Amber/Green/White) is saved into the STIX.
Sharing Range is not saved in STIX. This is for sharing with other users in the S-TIP instance.
- MISP (Malware Information Sharing Platform)
- Slack
- JIRA
- Splunk
- Phantom
GV is a CTI Graph Analytics View.
It visualizes STIX as CTI connected graph. Nodes are STIX elements like Indicators/Observables/Threat Actors/TTPs/Exploit Targets/Course of Actions/Campaigns.
When the user selects a specific STIX, S-TIP automatically searches related STIX stored in RS and lists them. Related STIXs are linked to each other through thick links. (In the below diagram, Each STIX has the same IPv4 address as an indicator).
- Windows 11
Chrome: 120.0.6099.225
Edge: 120.0.2210.144
FireFox: 121.0.1
- MacOS 14.2.1
Chrome: 120.0.6099.234
Safari: 17.2.1
- Ubuntu 22.04
Chrome: 120.0.6099.224
FireFox: 121.0.1