{"id":189,"date":"2022-06-24T13:15:32","date_gmt":"2022-06-24T13:15:32","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/?p=189"},"modified":"2024-06-23T17:57:14","modified_gmt":"2024-06-23T17:57:14","slug":"final-stix2-1","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/","title":{"rendered":"Final Published:  STIX2.1 &#038; TAXII2.1"},"content":{"rendered":"<p><i>The leading standards for representing and sharing cyberthreat intelligence are now OASIS Standards, publicly available for download and implementation.<\/i><\/p>\n<div><\/div>\n<div>OASIS Members and all interested parties,<\/p>\n<p>OASIS is pleased to announce the publication of its newest OASIS Standards, approved by the members on 10 June 2021:<\/p>\n<p><b>STIX\u2122 Version 2.1<\/b><br \/>\n<i>OASIS Standard<\/i><br \/>\n10 June 2021<\/p>\n<p>and<\/p>\n<p><b>TAXII\u2122 Version 2.1<\/b><br \/>\n<i>OASIS Standard<\/i><br \/>\n10 June 2021<\/p>\n<p>The OASIS Cyber Threat Intelligence (CTI) TC was chartered to define a set of information representations and protocols to address the need to model, analyze, and share cyber threat intelligence. The work was based initially on three specifications contributed by the US Department of Homeland Security (DHS) for development and standardization under the OASIS open standards process: STIX (Structured Threat Information Expression), TAXII (Trusted Automated Exchange of Indicator Information), and CybOX (Cyber Observable Expression).<\/p>\n<p>Structured Threat Information Expression (STIX) is a language and serialization format used to exchange cyber threat intelligence. STIX enables organizations and tools to share threat intelligence with one another in a way that improves many different capabilities, such as collaborative threat analysis, automated threat exchange, automated detection and response, and more.<\/p>\n<p>The TC received 11 Statements of Use from Accenture Security, Anomali, Avast Software s.r.o., CISA, DarkLight, Inc., EclecticIQ B.V., Fujitsu, IBM, New Context, SEKOIA, and Trend Micro.<\/p>\n<p>TAXII is an application layer protocol for the communication of cyber threat information in a simple and scalable manner. It is specifically designed to support the exchange of CTI represented in STIX, but is not limited to STIX.<\/p>\n<p>The TC received 9 Statements of Use from Avast Software s.r.o., Celerium, CISA, Cyware Labs, EclecticIQ B.V., FreeTAXII, Fujitsu, SEKOIA, and Trend Micro.<\/p>\n<p><b>URIs<\/b><\/p>\n<p>The OASIS Standards and all related files are available here:<\/p>\n<p><b>* STIX Version 2.1<\/b><\/p>\n<p>Editable source (Authoritative):<\/p>\n<\/div>\n<p>HTML:<br \/>\n<a href=\"https:\/\/docs.oasis-open.org\/cti\/stix\/v2.1\/os\/stix-v2.1-os.html\">https:\/\/docs.oasis-open.org\/cti\/stix\/v2.1\/os\/stix-v2.1-os.html<\/a><\/p>\n<p>PDF:<br \/>\n<a href=\"https:\/\/docs.oasis-open.org\/cti\/stix\/v2.1\/os\/stix-v2.1-os.pdf\">https:\/\/docs.oasis-open.org\/cti\/stix\/v2.1\/os\/stix-v2.1-os.pdf<\/a><\/p>\n<p><b>* TAXII Version 2.1<\/b><\/p>\n<p>Editable source (Authoritative):<\/p>\n<p>HTML:<br \/>\n<a href=\"https:\/\/docs.oasis-open.org\/cti\/taxii\/v2.1\/os\/taxii-v2.1-os.html\">https:\/\/docs.oasis-open.org\/cti\/taxii\/v2.1\/os\/taxii-v2.1-os.html<\/a><\/p>\n<p>PDF:<br \/>\n<a href=\"https:\/\/docs.oasis-open.org\/cti\/taxii\/v2.1\/os\/taxii-v2.1-os.pdf\">https:\/\/docs.oasis-open.org\/cti\/taxii\/v2.1\/os\/taxii-v2.1-os.pdf<\/a><\/p>\n<p><b>Distribution ZIP files<br \/>\n<\/b><br \/>\nFor your convenience, OASIS provides a complete package of the prose specifications and related files in ZIP distribution files. You can download the ZIP files here:<\/p>\n<p>* STIX Version 2.<\/p>\n<p>* TAXII\u2122 Version 2.<\/p>\n<p>Our congratulations to the members of the OASIS Cyber Threat Intelligence (CTI) TC on achieving this milestone.<\/p>\n<div><\/div>\n<\/div>\n<div><\/div>\n","protected":false},"excerpt":{"rendered":"<p>The leading standards for representing and sharing cyberthreat intelligence are now OASIS Standards, publicly available for download and implementation. OASIS Members and all interested parties, OASIS is pleased to announce the publication of its newest OASIS Standards, approved by the members on 10 June 2021: STIX\u2122 Version 2.1 OASIS Standard 10 June 2021 and TAXII\u2122 [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":592,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[255],"tags":[19,15,18],"class_list":["post-189","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-stix-taxii","tag-cti-tc","tag-oasis","tag-stix2-1"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"The leading standards for representing and sharing cyberthreat intelligence are now OASIS Standards, publicly available for download and implementation. OASIS Members and all interested parties, OASIS is pleased to announce the publication of its newest OASIS Standards, approved by the members on 10 June 2021: STIX\u2122 Version 2.1 OASIS Standard 10 June 2021 and TAXII\u2122\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Final Published: STIX2.1 &amp; TAXII2.1 - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"The leading standards for representing and sharing cyberthreat intelligence are now OASIS Standards, publicly available for download and implementation. OASIS Members and all interested parties, OASIS is pleased to announce the publication of its newest OASIS Standards, approved by the members on 10 June 2021: STIX\u2122 Version 2.1 OASIS Standard 10 June 2021 and TAXII\u2122\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2022-06-24T13:15:32+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-06-23T17:57:14+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Final Published: STIX2.1 &amp; TAXII2.1 - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"The leading standards for representing and sharing cyberthreat intelligence are now OASIS Standards, publicly available for download and implementation. OASIS Members and all interested parties, OASIS is pleased to announce the publication of its newest OASIS Standards, approved by the members on 10 June 2021: STIX\u2122 Version 2.1 OASIS Standard 10 June 2021 and TAXII\u2122\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2022\\\/06\\\/24\\\/final-stix2-1\\\/#blogposting\",\"name\":\"Final Published: STIX2.1 & TAXII2.1 - CTIN\",\"headline\":\"Final Published:  STIX2.1 &#038; TAXII2.1\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/STIX-2-1.jpg\",\"width\":969,\"height\":484},\"datePublished\":\"2022-06-24T13:15:32+00:00\",\"dateModified\":\"2024-06-23T17:57:14+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2022\\\/06\\\/24\\\/final-stix2-1\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2022\\\/06\\\/24\\\/final-stix2-1\\\/#webpage\"},\"articleSection\":\"STIX\\\/TAXII, CTI TC, OASIS, STIX2.1\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2022\\\/06\\\/24\\\/final-stix2-1\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"position\":3,\"name\":\"CyberSecurity\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/stix-taxii\\\/#listItem\",\"name\":\"STIX\\\/TAXII\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/stix-taxii\\\/#listItem\",\"position\":4,\"name\":\"STIX\\\/TAXII\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/stix-taxii\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2022\\\/06\\\/24\\\/final-stix2-1\\\/#listItem\",\"name\":\"Final Published:  STIX2.1 &#038; TAXII2.1\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/#listItem\",\"name\":\"CyberSecurity\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2022\\\/06\\\/24\\\/final-stix2-1\\\/#listItem\",\"position\":5,\"name\":\"Final Published:  STIX2.1 &#038; TAXII2.1\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/cybersecurity\\\/stix-taxii\\\/#listItem\",\"name\":\"STIX\\\/TAXII\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2022\\\/06\\\/24\\\/final-stix2-1\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2022\\\/06\\\/24\\\/final-stix2-1\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2022\\\/06\\\/24\\\/final-stix2-1\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2022\\\/06\\\/24\\\/final-stix2-1\\\/\",\"name\":\"Final Published: STIX2.1 & TAXII2.1 - CTIN\",\"description\":\"The leading standards for representing and sharing cyberthreat intelligence are now OASIS Standards, publicly available for download and implementation. OASIS Members and all interested parties, OASIS is pleased to announce the publication of its newest OASIS Standards, approved by the members on 10 June 2021: STIX\\u2122 Version 2.1 OASIS Standard 10 June 2021 and TAXII\\u2122\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2022\\\/06\\\/24\\\/final-stix2-1\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/06\\\/STIX-2-1.jpg\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2022\\\/06\\\/24\\\/final-stix2-1\\\/#mainImage\",\"width\":969,\"height\":484},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2022\\\/06\\\/24\\\/final-stix2-1\\\/#mainImage\"},\"datePublished\":\"2022-06-24T13:15:32+00:00\",\"dateModified\":\"2024-06-23T17:57:14+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Final Published: STIX2.1 &amp; TAXII2.1 - CTIN<\/title>\n\n","aioseo_head_json":{"title":"Final Published: STIX2.1 & TAXII2.1 - CTIN","description":"The leading standards for representing and sharing cyberthreat intelligence are now OASIS Standards, publicly available for download and implementation. OASIS Members and all interested parties, OASIS is pleased to announce the publication of its newest OASIS Standards, approved by the members on 10 June 2021: STIX\u2122 Version 2.1 OASIS Standard 10 June 2021 and TAXII\u2122","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/#blogposting","name":"Final Published: STIX2.1 & TAXII2.1 - CTIN","headline":"Final Published:  STIX2.1 &#038; TAXII2.1","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/06\/STIX-2-1.jpg","width":969,"height":484},"datePublished":"2022-06-24T13:15:32+00:00","dateModified":"2024-06-23T17:57:14+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/#webpage"},"articleSection":"STIX\/TAXII, CTI TC, OASIS, STIX2.1"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","position":3,"name":"CyberSecurity","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/stix-taxii\/#listItem","name":"STIX\/TAXII"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/stix-taxii\/#listItem","position":4,"name":"STIX\/TAXII","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/stix-taxii\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/#listItem","name":"Final Published:  STIX2.1 &#038; TAXII2.1"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/#listItem","name":"CyberSecurity"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/#listItem","position":5,"name":"Final Published:  STIX2.1 &#038; TAXII2.1","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/stix-taxii\/#listItem","name":"STIX\/TAXII"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/","name":"Final Published: STIX2.1 & TAXII2.1 - CTIN","description":"The leading standards for representing and sharing cyberthreat intelligence are now OASIS Standards, publicly available for download and implementation. OASIS Members and all interested parties, OASIS is pleased to announce the publication of its newest OASIS Standards, approved by the members on 10 June 2021: STIX\u2122 Version 2.1 OASIS Standard 10 June 2021 and TAXII\u2122","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/06\/STIX-2-1.jpg","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/#mainImage","width":969,"height":484},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/#mainImage"},"datePublished":"2022-06-24T13:15:32+00:00","dateModified":"2024-06-23T17:57:14+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"Final Published: STIX2.1 &amp; TAXII2.1 - CTIN","og:description":"The leading standards for representing and sharing cyberthreat intelligence are now OASIS Standards, publicly available for download and implementation. OASIS Members and all interested parties, OASIS is pleased to announce the publication of its newest OASIS Standards, approved by the members on 10 June 2021: STIX\u2122 Version 2.1 OASIS Standard 10 June 2021 and TAXII\u2122","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2022-06-24T13:15:32+00:00","article:modified_time":"2024-06-23T17:57:14+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"Final Published: STIX2.1 &amp; TAXII2.1 - CTIN","twitter:description":"The leading standards for representing and sharing cyberthreat intelligence are now OASIS Standards, publicly available for download and implementation. OASIS Members and all interested parties, OASIS is pleased to announce the publication of its newest OASIS Standards, approved by the members on 10 June 2021: STIX\u2122 Version 2.1 OASIS Standard 10 June 2021 and TAXII\u2122","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"189","title":null,"description":null,"keywords":null,"keyphrases":null,"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":null,"schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 22:00:57","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2021-08-07 21:56:26","updated":"2025-08-25 22:00:57"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/\" title=\"CyberSecurity\">CyberSecurity<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/stix-taxii\/\" title=\"STIX\/TAXII\">STIX\/TAXII<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tFinal Published:  STIX2.1 &amp; TAXII2.1\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"CyberSecurity","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/"},{"label":"STIX\/TAXII","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/cybersecurity\/stix-taxii\/"},{"label":"Final Published:  STIX2.1 &#038; TAXII2.1","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2022\/06\/24\/final-stix2-1\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/189","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=189"}],"version-history":[{"count":13,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/189\/revisions"}],"predecessor-version":[{"id":4421,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/189\/revisions\/4421"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/592"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=189"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=189"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=189"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}