Familiar with STIX 1.x?
Here’s a comparison to 2.0.

Structured Threat Information Expression (STIX™) is a language for describing cyber threat information in a standardized and structured manner to enable the exchange of cyber threat intelligence (CTI). STIX characterizes an extensive set of CTI to include indicators of adversary activity, as well as contextual information characterizing cyber adversary motivations, capabilities, and activities and best courses of action for defense and mitigation.

A set of specifications provide the normative description of STIX 2.0. While STIX 2.0 is defined to be independent of any specific serialization, JSON is the mandatory-to-implement serialization and informative JSON schemas are available. The following is a JSON-based example of a STIX 2.0 Campaign object:

    "type": "campaign",  
    "id": "campaign--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f",  
    "created": "2016-04-06T20:03:00.000Z",  
    "name": "Green Group Attacks Against Finance",  
    "description": "Campaign by Green Group against targets in the financial services sector."  
STIX 2.0 Relationship Example STIX 2.0 Relationship Example

In addition to describing a set of STIX Domain Objects (SDOs), STIX 2.0 enables relationships to be defined between objects. As the example shows, a Campaign may be attributed to a Threat Actor and may target a Vulnerability while an Indicator indicates the Campaign.

A companion CTI specification, TAXII™, is designed specifically to transport STIX Objects. However, the structures and serializations of STIX do not rely on any specific transport mechanism, and STIX provides a “Bundle,” a container for STIX Objects to allow for transportation of bulk STIX data, especially over non-TAXII communication mechanisms.

Complete information for STIX 2.0 is available on the OASIS Cyber Threat Intelligence (CTI) Technical Committee (TC) website. Specification documents and schemas and tools are also available.

STIX 2.0

STIX 2.0 Architecture

The twelve SDOs included in STIX 2.0 (listed below) represent a minimally viable product (MVP) that fulfills basic consumer and producer requirements for CTI sharing. Objects and properties not included in STIX 2.0, but deemed necessary by the community, will be included in future releases.

  • Attack Pattern Icon Attack Pattern – a type of Tactics, Techniques, and Procedures (TTP) that describes ways threat actors attempt to compromise targets.
  • Campaign Icon Campaign – a grouping of adversarial behaviors that describes a set of malicious activities or attacks that occur over a period of time against a specific set of targets.
  • Course of Action Icon Course of Action – an action taken to either prevent an attack or respond to an attack.
  • Identity Icon Identity – individuals, organizations, or groups, as well as classes of individuals, organizations, or groups.
  • Indicator Icon Indicator – contains a pattern that can be used to detect suspicious or malicious cyber activity.
  • Intrusion Set Icon Intrusion Set – a grouped set of adversarial behaviors and resources with common properties believed to be orchestrated by a single threat actor.
  • Malware Icon Malware – a type of TTP, also known as malicious code and malicious software, used to compromise the confidentiality, integrity, or availability of a victim’s data or system.
  • Observed Data Icon Observed Data – conveys information observed on a system or network (e.g., an IP address).
  • Report Icon Report – collections of threat intelligence focused on one or more topics, such as a description of a threat actor, malware, or attack technique, including contextual details.
  • Threat Actor Icon Threat Actor – individuals, groups, or organizations believed to be operating with malicious intent.
  • Tool Icon Tool – legitimate software that can be used by threat actors to perform attacks.
  • Vulnerability Icon Vulnerability – a mistake in software that can be directly used by a hacker to gain access to a system or network.

STIX 2.0 defines two STIX Relationship Objects (SROs):

  • Relationship Icon Relationship – used to link two SDOs and to describe how they are related to each other.
  • Sighting Icon Sighting – denotes the belief that an element of CTI was seen (e.g., indicator, malware).

A comparison of STIX 2.0 to 1.x can also be seen here.