https://github.com/muchdogesec/feeds2stix
A set of scripts that take data from threat intelligence feeds and converts it into STIX 2.1 objects.
https://github.com/muchdogesec/feeds2stix
stix2 threat-intelligence
Last synced: 7 months ago
JSON representation
A set of scripts that take data from threat intelligence feeds and converts it into STIX 2.1 objects.
- Host: GitHub
- URL: https://github.com/muchdogesec/feeds2stix
- Owner: muchdogesec
- License: apache-2.0
- Created: 2024-07-11T13:59:51.000Z (about 1 year ago)
- Default Branch: main
- Last Pushed: 2024-09-04T09:42:58.000Z (about 1 year ago)
- Last Synced: 2025-01-11T18:33:28.826Z (9 months ago)
- Topics: stix2, threat-intelligence
- Language: Python
- Homepage: https://www.dogesec.com/
- Size: 11.5 MB
- Stars: 4
- Watchers: 2
- Forks: 0
- Open Issues: 0
-
Metadata Files:
- Readme: README.md
- License: LICENSE
Awesome Lists containing this project
README
# feeds2stix
## Overview

A set of scripts that take data from threat intelligence feeds and convert them it into STIX 2.1 objects.
The aim of this repository is to demonstrate how easy it is for anyone to get structured cyber threat intelligence as STIX 2.1 objects into downstream tools.
We mainly use this repository to generate real examples we can use to test our other tooling. All content in this repo should be considered at proof-of-concept
## Structure of this repository
The key parts of this repository are structured as follows;
```txt
.
├── processors/
│ ├── producer1/
│ │ ├── README.md # describes the mapping of the feed.py files
│ │ ├── feed1.py
│ │ └── feed2.py
│ └── producer2/
│ ├── README.md
│ └── feed1.py
└── bundles/ # will only exist after one script has been run
├── producer1/
│ ├── feed1
│ │ ├── bundle1.json # multiple bundles can be produced for a single feed (e.g. seperated by threat actor)
│ │ └── bundle2.json
│ └── feed2
│ ├── bundle1.json
│ └── bundle2.json
└── producer2/
└── feed1
└── bundle1.json
```The `processors` directory contains the scripts that generate the data. These scripts output the data they create into the `bundles` directory (this directory will only exist once you run one of the processor scripts).
To give you can idea of what the data for each script looks like, we've included an `examples` directory containing output bundles in the respective producers `processors` directory.
## Adding new processors
Installing the script;
```shell
# clone the latest code
git clone https://github.com/muchdogesec/feeds2stix
# create a venv
cd feeds2stix
python3 -m venv feeds2stix-venv
source feeds2stix-venv/bin/activate
# install requirements
pip3 install -r requirements.txt
```TODO
## Useful supporting tools
* [This repository contains Open Source freely usable Threat Intel feeds that can be used without additional requirements. Contains multiple types such as IP, URL, CVE and Hash.](https://github.com/Bert-JanP/Open-Source-Threat-Intel-Feeds)
## Support
[Minimal support provided via the DOGESEC community](https://community.dogesec.com/).
## License
[Apache 2.0](/LICENSE).