Invitation to comment on STIX v2.1 from the CTI TC - ends March 11th

We are pleased to announce that STIX Version 2.1 CSPRD03 from the OASIS Cyber Threat Intelligence (CTI) TC [1] is now available for public review and comment.

Structured Threat Information Expression (STIX) is a language and serialization format used to exchange cyber threat intelligence. STIX enables organizations and tools to share threat intelligence with one another in a way that improves many different capabilities, such as collaborative threat analysis, automated threat exchange, automated detection and response, and more.

STIX v2.1 adds new objects and concepts and incorporates improvements based on experience implementing Version 2.0. The objects and features added for inclusion represent an iterative approach to fulfilling basic consumer and producer requirements for CTI sharing. Objects and properties not included in this version of STIX, but deemed necessary by the community, will be included in future releases.

The documents and related files are available here:

STIX Version 2.1
Committee Specification Draft 04 / Public Review Draft 03
20 February 2020

Editable source (Authoritative):
https://docs.oasis-open.org/cti/stix/v2.1/csprd03/stix-v2.1-csprd03.docx
HTML:
https://docs.oasis-open.org/cti/stix/v2.1/csprd03/stix-v2.1-csprd03.html
PDF:
https://docs.oasis-open.org/cti/stix/v2.1/csprd03/stix-v2.1-csprd03.pdf

For your convenience, OASIS provides a complete package of the prose specification and related files in a ZIP distribution file. You can download the ZIP file at:
https://docs.oasis-open.org/cti/stix/v2.1/csprd03/stix-v2.1-csprd03.zip

How to Provide Feedback

OASIS and the CTI TC value your feedback. We solicit feedback from potential users, developers and others, whether OASIS members or not, for the sake of improving the interoperability and quality of its technical work.

This public review starts 26 February 2020 at 00:00 UTC and ends 11 March 2020 at 11:59 UTC.

This specification was previously submitted for public review [2]. This 15-day review is limited in scope to changes made from the previous reviews. Changes are highlighted in a red-lined DIFF file included in the package [3].

Comments on the work may be submitted to the TC by following the instructions located at:
https://www.oasis-open.org/committees/comments/form.php?wg_abbrev=cti

Feedback submitted by TC non-members for this work and for other work of this TC is publicly archived and can be viewed at:
https://lists.oasis-open.org/archives/cti-comment/

All comments submitted to OASIS are subject to the OASIS Feedback License, which ensures that the feedback you provide carries the same obligations at least as the obligations of the TC members. In connection with the public review of these works, we call your attention to the OASIS IPR Policy [4] applicable especially [5] to the work of this technical committee. All members of the TC should be familiar with this document, which may create obligations regarding the disclosure and availability of a member's patent, copyright, trademark and license rights that read on an approved OASIS specification.

OASIS invites any persons who know of any such claims to disclose these if they may be essential to the implementation of the above specification, so that notice of them may be posted to the notice page for this TC's work.

Additional information about this specification and the TC may be found on the TC's public home page.

========== Additional references:

[1] OASIS Cyber Threat Intelligence (CTI) TC
https://www.oasis-open.org/committees/cti/

[2] Previous public reviews:
- 30-day public review, 14 August 2019:
https://lists.oasis-open.org/archives/members/201908/msg00008.html
- Comment resolution log:
https://docs.oasis-open.org/cti/stix/v2.1/csprd01/stix-v2.1-csprd01-comm...

- 15-day public review, 09 December 2019:
https://lists.oasis-open.org/archives/cti/201912/msg00001.html
- Comment resolution log:
https://docs.oasis-open.org/cti/stix/v2.1/csprd03/stix-v2.1-csprd03-comm...

[3] Red-lined version:
https://docs.oasis-open.org/cti/stix/v2.1/csprd03/stix-v2.1-csprd03-DIFF...

[4] https://www.oasis-open.org/policies-guidelines/ipr

[5] https://www.oasis-open.org/committees/cti/ipr.php
https://www.oasis-open.org/policies-guidelines/ipr#Non-Assertion-Mode
Non-Assertion Mode

Associated TC: 
Cyber Threat Intelligence (CTI)