STIX/TAXII Threat Intelligence Export¶
Malwar supports exporting its threat intelligence data in STIX 2.1 (Structured Threat Information eXpression) format and serving it via TAXII 2.1 (Trusted Automated eXchange of Intelligence Information) compatible endpoints.
What is STIX/TAXII?¶
STIX is an open standard language for describing cyber threat information. It provides a structured, machine-readable format for sharing indicators of compromise (IOCs), threat actors, campaigns, and malware analysis results.
TAXII is the companion transport protocol that defines how STIX data is exchanged between systems.
Together, STIX and TAXII enable:
- Automated threat intelligence sharing between security platforms
- Standardized IOC formats that any compliant tool can consume
- Interoperability between Malwar and enterprise SIEM/SOAR solutions
Data Mapping¶
| Malwar Entity | STIX Object(s) | Description |
|---|---|---|
| Campaign | threat-actor + campaign |
Tracked malware campaigns and attribution |
| Signature | indicator |
IOC patterns (IP, domain, URL, hash, etc.) |
| Scan Result | malware-analysis |
Results of scanning SKILL.md files |
| (System) | identity |
Malwar itself as the analysis tool |
| (Linking) | relationship |
Connects indicators to campaigns |
IOC Type to STIX Pattern Mapping¶
| Malwar IOC Type | STIX Pattern |
|---|---|
ip |
[ipv4-addr:value = '<value>'] |
domain |
[domain-name:value = '<value>'] |
url |
[url:value = '<value>'] |
sha256 |
[file:hashes.'SHA-256' = '<value>'] |
email |
[email-addr:value = '<value>'] |
regex |
[artifact:payload_bin = '<value>'] |
CLI Usage¶
# Export all threat intelligence as STIX 2.1
malwar export stix
# Export a specific campaign
malwar export stix --campaign ClawHavoc
# Write to a file
malwar export stix --output threat-intel.json
# Export in TAXII envelope format
malwar export stix --format taxii
API Endpoints¶
All endpoints are under /api/v1/export/ and require the X-API-Key header when authentication is enabled.
STIX Bundle¶
GET /api/v1/export/stix -- Returns a complete STIX 2.1 bundle.
TAXII Discovery¶
GET /api/v1/export/taxii/discovery -- Returns the TAXII 2.1 discovery document.
TAXII Collections¶
GET /api/v1/export/taxii/collections -- Lists available TAXII collections.
TAXII Collection Objects¶
GET /api/v1/export/taxii/collections/{collection_id}/objects -- Returns STIX objects from the specified collection.
Default collection ID: malwar-threat-intel-001.
SIEM Integration¶
Splunk¶
- Install the "Splunk Add-on for TAXII" from Splunkbase
- Configure Discovery URL:
http://<malwar-host>:8000/api/v1/export/taxii/discovery - Select collection:
malwar-threat-intel-001 - Set the polling interval
Elastic Security¶
- Navigate to Integrations and search for "Threat Intelligence TAXII"
- Configure URL:
http://<malwar-host>:8000/api/v1/export/taxii/collections/malwar-threat-intel-001/objects - Set interval:
15m
IBM QRadar¶
- Navigate to Threat Intelligence > TAXII Feeds
- Add Discovery URL:
http://<malwar-host>:8000/api/v1/export/taxii/discovery - Select the
malwar-threat-intel-001collection