{"id":317,"date":"2017-10-28T00:00:00","date_gmt":"2017-10-28T00:00:00","guid":{"rendered":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/"},"modified":"2024-06-10T23:37:26","modified_gmt":"2024-06-10T23:37:26","slug":"stix-2-0-taxii-2-0-finalized-published","status":"publish","type":"post","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/","title":{"rendered":"STIX 2.0 &#038; TAXII 2.0 Finalized &#038; Published"},"content":{"rendered":"<p>OASIS and the Cyber Threat Intelligence (CTI) Technical Committee are pleased to announce the publication of STIX Version 2.0 and TAXII Version 2.0 as Committee Specifications.<\/p>\n<p>The Cyber Threat Intelligence (CTI) TC is developing information representations and protocols to help industries, organizations, and governments model, analyze, and share cyber threat intelligence.<\/p>\n<p>STIX &#8211; Structured Threat Information Expression &#8211; is a language and serialization format used to exchange cyber threat intelligence (CTI). STIX enables organizations to share CTI with one another in a consistent and machine readable manner, allowing security communities to better understand what computer-based attacks they are most likely to see and to anticipate and\/or respond to those attacks faster and more effectively. STIX is designed to improve many different capabilities, such as collaborative threat analysis, automated threat exchange, automated detection and response, and more.<\/p>\n<p><a href=\"http:\/\/ctin.us\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/1001-blue-2\/\" rel=\"attachment wp-att-5098\"><img decoding=\"async\" class=\"alignright size-medium wp-image-5098 lazyload\" src=\"data:image\/gif;base64,R0lGODlhAQABAIAAAAAAAP\/\/\/yH5BAEAAAAALAAAAAABAAEAAAIBRAA7\" data-src=\"http:\/\/ctin.us\/wp-content\/uploads\/2017\/10\/1001-Blue-e1509181247986-300x141.jpg\" alt=\"\" width=\"300\" height=\"141\" \/><noscript><img decoding=\"async\" class=\"alignright size-medium wp-image-5098 lazyload\" src=\"http:\/\/ctin.us\/wp-content\/uploads\/2017\/10\/1001-Blue-e1509181247986-300x141.jpg\" alt=\"\" width=\"300\" height=\"141\" \/><\/noscript><\/a>STIX Version 2.0 has been significantly redesigned and, as a result, omits some of the objects and properties defined in STIX 1.2.1. The objects chosen for inclusion in STIX V2.0 represent a minimally viable product (MVP) that fulfills basic consumer and producer requirements for CTI sharing. Objects and properties not included in STIX 2.0, but deemed necessary by the community, will be included in future releases.<\/p>\n<p>TAXII &#8211; Trusted Automated Exchange of Intelligence Information &#8211; is an application layer protocol used to exchange cyber threat intelligence (CTI) over HTTPS. It enables organizations to share CTI by defining an API that aligns with common sharing models.<\/p>\n<p>TAXII is specifically designed to support the exchange of CTI represented in STIX. As such, the examples and some features in the specification are intended to align with STIX. This does not mean TAXII cannot be used to share data in other formats; it is designed for STIX, but is not limited to STIX.<\/p>\n<p>These Committee Specifications are OASIS deliverables, completed and approved by the TC and fully ready for testing and implementation.<\/p>\n<p>The specifications and related files are available here:<\/p>\n<ul>\n<li>STIX Version 2.0<br \/>\nCommittee Specification 01<br \/>\n19 July 2017<\/p>\n<\/li>\n<li>Part 1: STIX Core Concepts<br \/>\nEditable source (Authoritative):<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part1-stix-core\/stix-v2.0-cs01-part1-stix-core.docx<\/p>\n<\/li>\n<\/ul>\n<p>HTML:<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part1-stix-core\/stix-v2.0-cs01-part1-stix-core.html<\/p>\n<p>PDF:<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part1-stix-core\/stix-v2.0-cs01-part1-stix-core.pdf<\/p>\n<ul>\n<li>Part 2: STIX Objects<br \/>\nEditable source (Authoritative):<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part2-stix-objects\/stix-v2.0-cs01-part2-stix-objects.docx<\/li>\n<\/ul>\n<p>HTML:<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part2-stix-objects\/stix-v2.0-cs01-part2-stix-objects.html<\/p>\n<p>PDF:<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part2-stix-objects\/stix-v2.0-cs01-part2-stix-objects.pdf<\/p>\n<ul>\n<li>Part 3: Cyber Observable Core Concepts<br \/>\nEditable source (Authoritative):<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part3-cyber-observable-core\/stix-v2.0-cs01-part3-cyber-observable-core.docx<\/li>\n<\/ul>\n<p>HTML:<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part3-cyber-observable-core\/stix-v2.0-cs01-part3-cyber-observable-core.html<\/p>\n<p>PDF:<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part3-cyber-observable-core\/stix-v2.0-cs01-part3-cyber-observable-core.pdf<\/p>\n<ul>\n<li>Part 4: Cyber Observable Objects<br \/>\nEditable source (Authoritative):<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part4-cyber-observable-objects\/stix-v2.0-cs01-part4-cyber-observable-objects.docx<\/li>\n<\/ul>\n<p>HTML:<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part4-cyber-observable-objects\/stix-v2.0-cs01-part4-cyber-observable-objects.html<\/p>\n<p>PDF:<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part4-cyber-observable-objects\/stix-v2.0-cs01-part4-cyber-observable-objects.pdf<\/p>\n<ul>\n<li>Part 5: Patterning<br \/>\nEditable source (Authoritative):<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part5-stix-patterning\/stix-v2.0-cs01-part5-stix-patterning.docx<\/li>\n<\/ul>\n<p>HTML:<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part5-stix-patterning\/stix-v2.0-cs01-part5-stix-patterning.html<\/p>\n<p>PDF:<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/part5-stix-patterning\/stix-v2.0-cs01-part5-stix-patterning.pdf<\/p>\n<ul>\n<li>TAXII Version 2.0<br \/>\nCommittee Specification 01<br \/>\n19 July 2017<\/li>\n<\/ul>\n<p>Editable source (Authoritative):<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/taxii\/v2.0\/cs01\/taxii-v2.0-cs01.docx<\/p>\n<p>HTML:<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/taxii\/v2.0\/cs01\/taxii-v2.0-cs01.html<\/p>\n<p>PDF:<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/taxii\/v2.0\/cs01\/taxii-v2.0-cs01.pdf<\/p>\n<p>Distribution ZIP files<\/p>\n<p>For your convenience, OASIS provides complete packages of the prose specifications and related files in ZIP distribution files. You can download the ZIP files here:<\/p>\n<ul>\n<li>STIX V2.0: http:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/cs01\/stix-v2.0-cs01.zip\n<\/li>\n<li>\n<p>TAXII V2.0: http:\/\/docs.oasis-open.org\/cti\/taxii\/v2.0\/cs01\/taxii-v2.0-cs01.zip<\/p>\n<\/li>\n<\/ul>\n<p>Members of the CTI TC [1] approved this specification by Special Majority Vote. The specification had been released for public review as required by the TC Process [2]. The vote to approve as a Committee Specification passed [3], and the document is now available online in the OASIS Library as referenced above.<\/p>\n<p>Our congratulations to the TC on achieving this milestone and our thanks to the reviewers who provided feedback on the specification drafts to help improve the quality of the work.<\/p>\n<p>========== Additional references:<\/p>\n<p>[1] OASIS Cyber Threat Intelligence (CTI) TC<br \/>\nhttps:\/\/www.oasis-open.org\/committees\/cti\/<\/p>\n<p>[2] Public reviews:<br \/>\n&#8211; STIX V2.0:<br \/>\n* 30-day public review, 08 March 2017:<br \/>\nhttps:\/\/lists.oasis-open.org\/archives\/members\/201703\/msg00000.html<br \/>\n&#8211; Comment resolution log:<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/csprd01\/stix-v2.0-csprd01-comment-resolution-log.xlsx<\/p>\n<ul>\n<li>15-day public review, 18 May 2017:<br \/>\nhttps:\/\/lists.oasis-open.org\/archives\/members\/201705\/msg00006.html<\/li>\n<li>Comment resolution log:<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/stix\/v2.0\/csprd02\/stix-v2.0-csprd02-comment-resolution-log.xlsx<\/p>\n<\/li>\n<li>\n<p>TAXII v2.0:<\/p>\n<\/li>\n<li>30-day public review, 12 May 2017:<br \/>\nhttps:\/\/lists.oasis-open.org\/archives\/members\/201705\/msg00003.html<\/li>\n<li>Comment resolution log:<br \/>\nhttp:\/\/docs.oasis-open.org\/cti\/taxii\/v2.0\/csprd01\/taxii-v2.0-csprd01-comment-resolution-log.xlsx<\/li>\n<\/ul>\n<p>[3] Approval ballot:<br \/>\nhttps:\/\/www.oasis-open.org\/committees\/ballot.php?id=3102<\/p>\n","protected":false},"excerpt":{"rendered":"<p>OASIS and the Cyber Threat Intelligence (CTI) Technical Committee are pleased to announce the publication of STIX Version 2.0 and TAXII Version 2.0 as Committee Specifications. The Cyber Threat Intelligence (CTI) TC is developing information representations and protocols to help industries, organizations, and governments model, analyze, and share cyber threat intelligence. STIX &#8211; Structured Threat [&hellip;]<\/p>\n","protected":false},"author":2,"featured_media":318,"comment_status":"closed","ping_status":"closed","sticky":false,"template":"elementor_theme","format":"standard","meta":{"_exactmetrics_skip_tracking":false,"_exactmetrics_sitenote_active":false,"_exactmetrics_sitenote_note":"","_exactmetrics_sitenote_category":0,"footnotes":""},"categories":[5,255],"tags":[300,293],"class_list":["post-317","post","type-post","status-publish","format-standard","has-post-thumbnail","hentry","category-automation","category-stix-taxii","tag-stix2","tag-taxii2"],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.9.5.2 - aioseo.com -->\n\t<meta name=\"description\" content=\"OASIS and the Cyber Threat Intelligence (CTI) Technical Committee are pleased to announce the publication of STIX Version 2.0 and TAXII Version 2.0 as Committee Specifications. The Cyber Threat Intelligence (CTI) TC is developing information representations and protocols to help industries, organizations, and governments model, analyze, and share cyber threat intelligence. STIX - Structured Threat\" \/>\n\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t<meta name=\"author\" content=\"Jane Ginn\"\/>\n\t<link rel=\"canonical\" href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/\" \/>\n\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.9.5.2\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"CTIN - Cybersecurity Center\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"STIX 2.0 &amp; TAXII 2.0 Finalized &amp; Published - CTIN\" \/>\n\t\t<meta property=\"og:description\" content=\"OASIS and the Cyber Threat Intelligence (CTI) Technical Committee are pleased to announce the publication of STIX Version 2.0 and TAXII Version 2.0 as Committee Specifications. The Cyber Threat Intelligence (CTI) TC is developing information representations and protocols to help industries, organizations, and governments model, analyze, and share cyber threat intelligence. STIX - Structured Threat\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/\" \/>\n\t\t<meta property=\"og:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:secure_url\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<meta property=\"og:image:width\" content=\"112\" \/>\n\t\t<meta property=\"og:image:height\" content=\"112\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2017-10-28T00:00:00+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2024-06-10T23:37:26+00:00\" \/>\n\t\t<meta property=\"article:publisher\" content=\"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary\" \/>\n\t\t<meta name=\"twitter:site\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:title\" content=\"STIX 2.0 &amp; TAXII 2.0 Finalized &amp; Published - CTIN\" \/>\n\t\t<meta name=\"twitter:description\" content=\"OASIS and the Cyber Threat Intelligence (CTI) Technical Committee are pleased to announce the publication of STIX Version 2.0 and TAXII Version 2.0 as Committee Specifications. The Cyber Threat Intelligence (CTI) TC is developing information representations and protocols to help industries, organizations, and governments model, analyze, and share cyber threat intelligence. STIX - Structured Threat\" \/>\n\t\t<meta name=\"twitter:creator\" content=\"@CTIN_Global\" \/>\n\t\t<meta name=\"twitter:image\" content=\"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"BlogPosting\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2017\\\/10\\\/28\\\/stix-2-0-taxii-2-0-finalized-published\\\/#blogposting\",\"name\":\"STIX 2.0 & TAXII 2.0 Finalized & Published - CTIN\",\"headline\":\"STIX 2.0 &#038; TAXII 2.0 Finalized &#038; Published\",\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/1001-Blue-e1509181247986.jpg\",\"width\":322,\"height\":151},\"datePublished\":\"2017-10-28T00:00:00+00:00\",\"dateModified\":\"2024-06-10T23:37:26+00:00\",\"inLanguage\":\"en-US\",\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2017\\\/10\\\/28\\\/stix-2-0-taxii-2-0-finalized-published\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2017\\\/10\\\/28\\\/stix-2-0-taxii-2-0-finalized-published\\\/#webpage\"},\"articleSection\":\"Automation, STIX\\\/TAXII, STIX2, TAXII2\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2017\\\/10\\\/28\\\/stix-2-0-taxii-2-0-finalized-published\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"position\":2,\"name\":\"Posts\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/#listItem\",\"name\":\"COTH\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com#listItem\",\"name\":\"Home\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/#listItem\",\"position\":3,\"name\":\"COTH\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/automation\\\/#listItem\",\"name\":\"Automation\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/blog\\\/posts\\\/#listItem\",\"name\":\"Posts\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/automation\\\/#listItem\",\"position\":4,\"name\":\"Automation\",\"item\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/automation\\\/\",\"nextItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2017\\\/10\\\/28\\\/stix-2-0-taxii-2-0-finalized-published\\\/#listItem\",\"name\":\"STIX 2.0 &#038; TAXII 2.0 Finalized &#038; Published\"},\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/#listItem\",\"name\":\"COTH\"}},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2017\\\/10\\\/28\\\/stix-2-0-taxii-2-0-finalized-published\\\/#listItem\",\"position\":5,\"name\":\"STIX 2.0 &#038; TAXII 2.0 Finalized &#038; Published\",\"previousItem\":{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/category\\\/coth\\\/automation\\\/#listItem\",\"name\":\"Automation\"}}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\",\"name\":\"Cyber Threat Intelligence Network\",\"description\":\"Cybersecurity Center\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"telephone\":\"+14804624039\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2021\\\/01\\\/cropped-cropped-2020-logo.png\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2017\\\/10\\\/28\\\/stix-2-0-taxii-2-0-finalized-published\\\/#organizationLogo\",\"width\":757,\"height\":237},\"image\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2017\\\/10\\\/28\\\/stix-2-0-taxii-2-0-finalized-published\\\/#organizationLogo\"},\"sameAs\":[\"https:\\\/\\\/www.facebook.com\\\/CyberThreatIntelligenceNetwork\\\/\",\"https:\\\/\\\/twitter.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\"]},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/\",\"name\":\"Jane Ginn\",\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2024\\\/07\\\/rjg-PhonePhoto.PNG\"},\"sameAs\":[\"https:\\\/\\\/x.com\\\/CTIN_Global\",\"https:\\\/\\\/www.linkedin.com\\\/in\\\/janeginn\\\/\",\"https:\\\/\\\/bsky.app\\\/profile\\\/janeginn.bsky.social\",\"https:\\\/\\\/infosec.exchange\\\/@ctin\"],\"description\":\"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn\",\"jobTitle\":\"CTIN President & Co-Founder\",\"alumniOf\":[{\"@type\":\"EducationalOrganization\",\"name\":\"Norwich University\",\"sameAs\":\"https:\\\/\\\/online.norwich.edu\\\/online\\\/programs-courses\\\/programs\\\/master-science-cybersecurity\"}]},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2017\\\/10\\\/28\\\/stix-2-0-taxii-2-0-finalized-published\\\/#webpage\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2017\\\/10\\\/28\\\/stix-2-0-taxii-2-0-finalized-published\\\/\",\"name\":\"STIX 2.0 & TAXII 2.0 Finalized & Published - CTIN\",\"description\":\"OASIS and the Cyber Threat Intelligence (CTI) Technical Committee are pleased to announce the publication of STIX Version 2.0 and TAXII Version 2.0 as Committee Specifications. The Cyber Threat Intelligence (CTI) TC is developing information representations and protocols to help industries, organizations, and governments model, analyze, and share cyber threat intelligence. STIX - Structured Threat\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2017\\\/10\\\/28\\\/stix-2-0-taxii-2-0-finalized-published\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/author\\\/neffie\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/wp-content\\\/uploads\\\/2017\\\/10\\\/1001-Blue-e1509181247986.jpg\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2017\\\/10\\\/28\\\/stix-2-0-taxii-2-0-finalized-published\\\/#mainImage\",\"width\":322,\"height\":151},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/index.php\\\/2017\\\/10\\\/28\\\/stix-2-0-taxii-2-0-finalized-published\\\/#mainImage\"},\"datePublished\":\"2017-10-28T00:00:00+00:00\",\"dateModified\":\"2024-06-10T23:37:26+00:00\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#website\",\"url\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/\",\"name\":\"Training Center\",\"description\":\"Cybersecurity Center\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/cyberthreatintelligencenetwork.com\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>STIX 2.0 &amp; TAXII 2.0 Finalized &amp; Published - CTIN<\/title>\n\n","aioseo_head_json":{"title":"STIX 2.0 & TAXII 2.0 Finalized & Published - CTIN","description":"OASIS and the Cyber Threat Intelligence (CTI) Technical Committee are pleased to announce the publication of STIX Version 2.0 and TAXII Version 2.0 as Committee Specifications. The Cyber Threat Intelligence (CTI) TC is developing information representations and protocols to help industries, organizations, and governments model, analyze, and share cyber threat intelligence. STIX - Structured Threat","canonical_url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"BlogPosting","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/#blogposting","name":"STIX 2.0 & TAXII 2.0 Finalized & Published - CTIN","headline":"STIX 2.0 &#038; TAXII 2.0 Finalized &#038; Published","author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2017\/10\/1001-Blue-e1509181247986.jpg","width":322,"height":151},"datePublished":"2017-10-28T00:00:00+00:00","dateModified":"2024-06-10T23:37:26+00:00","inLanguage":"en-US","mainEntityOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/#webpage"},"isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/#webpage"},"articleSection":"Automation, STIX\/TAXII, STIX2, TAXII2"},{"@type":"BreadcrumbList","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","position":1,"name":"Home","item":"https:\/\/cyberthreatintelligencenetwork.com","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","position":2,"name":"Posts","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/#listItem","name":"COTH"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com#listItem","name":"Home"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/#listItem","position":3,"name":"COTH","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/automation\/#listItem","name":"Automation"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/#listItem","name":"Posts"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/automation\/#listItem","position":4,"name":"Automation","item":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/automation\/","nextItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/#listItem","name":"STIX 2.0 &#038; TAXII 2.0 Finalized &#038; Published"},"previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/#listItem","name":"COTH"}},{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/#listItem","position":5,"name":"STIX 2.0 &#038; TAXII 2.0 Finalized &#038; Published","previousItem":{"@type":"ListItem","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/automation\/#listItem","name":"Automation"}}]},{"@type":"Organization","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization","name":"Cyber Threat Intelligence Network","description":"Cybersecurity Center","url":"https:\/\/cyberthreatintelligencenetwork.com\/","telephone":"+14804624039","logo":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2021\/01\/cropped-cropped-2020-logo.png","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/#organizationLogo","width":757,"height":237},"image":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/#organizationLogo"},"sameAs":["https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","https:\/\/twitter.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social"]},{"@type":"Person","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/","name":"Jane Ginn","image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/07\/rjg-PhonePhoto.PNG"},"sameAs":["https:\/\/x.com\/CTIN_Global","https:\/\/www.linkedin.com\/in\/janeginn\/","https:\/\/bsky.app\/profile\/janeginn.bsky.social","https:\/\/infosec.exchange\/@ctin"],"description":"As the co-founder of the US-based Cyber Threat Intelligence Network (CTIN), a consultancy with partners in Europe, Ms. Ginn has been pivotal in the development of the STIX international standard for modeling and sharing threat intelligence. Her work with the Cyber Threat Intelligence (CTI) technical committee earned her the 2020 Distinguished Contributor award from OASIS. She is currently supporting the analysis services of Datos Insights, an advisory firm focusing on the financial services sector. In public service, she advised five Secretaries of the US Department of Commerce on international trade issues from 1994 to 2001 and served on the Washington District Export Council for five years. In the EU, she was an appointed member of the European Union's ENISA Threat Landscape Stakeholders' Group for four years. A world traveler and amateur photojournalist, she has visited over 50 countries, further enriching her global outlook and professional insights. Follow me on LinkedIn","jobTitle":"CTIN President & Co-Founder","alumniOf":[{"@type":"EducationalOrganization","name":"Norwich University","sameAs":"https:\/\/online.norwich.edu\/online\/programs-courses\/programs\/master-science-cybersecurity"}]},{"@type":"WebPage","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/#webpage","url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/","name":"STIX 2.0 & TAXII 2.0 Finalized & Published - CTIN","description":"OASIS and the Cyber Threat Intelligence (CTI) Technical Committee are pleased to announce the publication of STIX Version 2.0 and TAXII Version 2.0 as Committee Specifications. The Cyber Threat Intelligence (CTI) TC is developing information representations and protocols to help industries, organizations, and governments model, analyze, and share cyber threat intelligence. STIX - Structured Threat","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website"},"breadcrumb":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/#breadcrumblist"},"author":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"creator":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/author\/neffie\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2017\/10\/1001-Blue-e1509181247986.jpg","@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/#mainImage","width":322,"height":151},"primaryImageOfPage":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/#mainImage"},"datePublished":"2017-10-28T00:00:00+00:00","dateModified":"2024-06-10T23:37:26+00:00"},{"@type":"WebSite","@id":"https:\/\/cyberthreatintelligencenetwork.com\/#website","url":"https:\/\/cyberthreatintelligencenetwork.com\/","name":"Training Center","description":"Cybersecurity Center","inLanguage":"en-US","publisher":{"@id":"https:\/\/cyberthreatintelligencenetwork.com\/#organization"}}]},"og:locale":"en_US","og:site_name":"CTIN - Cybersecurity Center","og:type":"article","og:title":"STIX 2.0 &amp; TAXII 2.0 Finalized &amp; Published - CTIN","og:description":"OASIS and the Cyber Threat Intelligence (CTI) Technical Committee are pleased to announce the publication of STIX Version 2.0 and TAXII Version 2.0 as Committee Specifications. The Cyber Threat Intelligence (CTI) TC is developing information representations and protocols to help industries, organizations, and governments model, analyze, and share cyber threat intelligence. STIX - Structured Threat","og:url":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/","og:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:secure_url":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png","og:image:width":112,"og:image:height":112,"article:published_time":"2017-10-28T00:00:00+00:00","article:modified_time":"2024-06-10T23:37:26+00:00","article:publisher":"https:\/\/www.facebook.com\/CyberThreatIntelligenceNetwork\/","twitter:card":"summary","twitter:site":"@CTIN_Global","twitter:title":"STIX 2.0 &amp; TAXII 2.0 Finalized &amp; Published - CTIN","twitter:description":"OASIS and the Cyber Threat Intelligence (CTI) Technical Committee are pleased to announce the publication of STIX Version 2.0 and TAXII Version 2.0 as Committee Specifications. The Cyber Threat Intelligence (CTI) TC is developing information representations and protocols to help industries, organizations, and governments model, analyze, and share cyber threat intelligence. STIX - Structured Threat","twitter:creator":"@CTIN_Global","twitter:image":"https:\/\/cyberthreatintelligencenetwork.com\/wp-content\/uploads\/2024\/05\/SocialShare-Image.png"},"aioseo_meta_data":{"post_id":"317","title":null,"description":null,"keywords":null,"keyphrases":null,"primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":null,"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"ProductReview":[],"Car":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"BlogPosting","isEnabled":true},"graphs":[]},"schema_type":null,"schema_type_options":null,"pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"seo_analyzer_scan_date":"2025-08-25 22:41:19","breadcrumb_settings":null,"limit_modified_date":false,"reviewed_by":null,"open_ai":null,"ai":null,"created":"2021-08-07 21:55:02","updated":"2025-08-25 22:41:19"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/\" title=\"Posts\">Posts<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/\" title=\"COTH\">COTH<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/automation\/\" title=\"Automation\">Automation<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">\u00bb<\/span><span class=\"aioseo-breadcrumb\">\n\tSTIX 2.0 &amp; TAXII 2.0 Finalized &amp; Published\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/cyberthreatintelligencenetwork.com"},{"label":"Posts","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/blog\/posts\/"},{"label":"COTH","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/"},{"label":"Automation","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/category\/coth\/automation\/"},{"label":"STIX 2.0 &#038; TAXII 2.0 Finalized &#038; Published","link":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/2017\/10\/28\/stix-2-0-taxii-2-0-finalized-published\/"}],"amp_enabled":false,"_links":{"self":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/317","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/users\/2"}],"replies":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/comments?post=317"}],"version-history":[{"count":1,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/317\/revisions"}],"predecessor-version":[{"id":376,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/posts\/317\/revisions\/376"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media\/318"}],"wp:attachment":[{"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/media?parent=317"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/categories?post=317"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cyberthreatintelligencenetwork.com\/index.php\/wp-json\/wp\/v2\/tags?post=317"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}