{"id":18088,"date":"2021-12-07T12:05:36","date_gmt":"2021-12-07T06:35:36","guid":{"rendered":"https:\/\/www.varutra.com\/?p=18088"},"modified":"2022-12-02T11:23:30","modified_gmt":"2022-12-02T05:53:30","slug":"security-threat-intelligence-standards-stix-and-taxii","status":"publish","type":"post","link":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/","title":{"rendered":"Security Threat Intelligence Standards \u2013 STIX and TAXII"},"content":{"rendered":"<p><img loading=\"lazy\" decoding=\"async\" width=\"1920\" height=\"1080\" src=\"https:\/\/varutra-1a3b6.kxcdn.com\/wp-content\/uploads\/2021\/12\/Blogs-Banner-Q4-21-1-1024x535.png\"  class=\"sh-overlay-item sh-table-cell ls-is-cached lazyloaded\" data-rel=\"lightcase\" title=\"Security Threat Intelligence Standards STIX and TAXII - Varutra Consulting\"><\/p>\n<h3><strong>Introduction:<\/strong><\/h3>\n<p>Security Threat Intelligence Standards (STIX and TAXII) make day-to-day <a href=\"https:\/\/www.varutra.com\/soc-and-global-threat-management-services\/\">SOC<\/a> operations go uninterrupted with a shared strategy that provides a collaborative response to cybersecurity threats.<\/p>\n<p>MITRE is one such organization that collaborates with industry and government institutions to develop a common approach towards cybersecurity by providing registries of baseline security data, establishing standardized languages for accurately communicating cybersecurity information, and defining proper utilization. One of MITRE&#8217;s first efforts to label security vulnerability was the\u00a0<a href=\"https:\/\/cve.mitre.org\/\">Common Vulnerabilities and Exposures (CVE\u00ae)<\/a>. It is the standard for naming vulnerabilities that allows security devices, programs, and entities to be linked. CVE compatibility has been reached in over 100 products and services from over 75 vendors.<\/p>\n<p>As we speak, MITRE is currently working on two new projects for exchanging cyber threat information: the\u00a0<a href=\"https:\/\/oasis-open.github.io\/cti-documentation\/\">Trusted Automated eXchange of Indicator Information (TAXIITM) and the Structured Threat Information eXpression (STIXTM)<\/a>, that are being funded by the United States Department of Homeland Security.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Security Threat <\/strong><strong>Intelligence<\/strong><strong> Standards:<\/strong><\/h3>\n<p>TAXII is a chain of protocols that are used for safe and secure sharing of cyber-threat data for real-time observation, protection, and reducing cyber-attacks. While, STIX is a standard format for cyber-threat data, including cyber observables, indicators of compromise, incidents, and TTP (techniques, tactics, and procedures). In the areas of vulnerability management, software testing, application compliance, asset management, enterprise reporting, ransomware protection, configuration management, incident management, remediation, and threat knowledge sharing, TAXII and STIX together help communities in sharing the coordinated <a href=\"https:\/\/www.varutra.com\/threat-hunting-and-threat-intelligence\/\">threat intelligence<\/a> and facilitate collective defense.<\/p>\n<p>&nbsp;<\/p>\n<h4>STIX<\/h4>\n<p>MITRE and the OASIS Cyber Threat Intelligence (CTI) Technical Committee developed Structured Threat Information Expression (STIXTM), an international standard language and serialization format that has been adopted by many bits of intelligence exchange groups and organizations for exchanging cyber threat intelligence (CTI) in an order to describe the threat.<\/p>\n<p>STIX 2.1 standard introduces STIX Domain Objects (SDO), which is an object-based method for organizing threat information that makes it easy to use the details required to make network security assessments. These objects are described as STIX Relationship Objects (SROs), which show how they relate to other objects, giving a clear picture of the danger. There are currently 18 STIX objects available to identify threat data, which can be grouped or linked to each other to indicate certain types of relationships to aid in the classification of threats.<\/p>\n<ul>\n<li><strong>Attack Pattern<\/strong>: A form of TTP that describes the methods used by attackers to breach targets.<\/li>\n<li><strong>Campaign<\/strong>: A collection of hostile behavior that represents a series of malicious actions against a particular range of targets over time.<\/li>\n<li><strong>The course of Action<\/strong>: A suggestion by an information provider to a user regarding the steps they should take concerning that intelligence.<\/li>\n<li><strong>Grouping<\/strong>: Unlike a STIX Bundle which explicitly conveys no context, this asserts that the referenced STIX Objects have a similar context.<\/li>\n<li><strong>Identity<\/strong>: People, organizations, programs, or groups (e.g., ACME, Inc.) as well as divisions of individuals, organizations, structures, or groups (e.g., the finance sector).<\/li>\n<li><strong>Indicator<\/strong>: This contains a pattern for detecting illegal or disruptive cyber activity.<\/li>\n<li><strong>Infrastructure<\/strong>: Represents a form of TTP and defines all facilities, computing programs, and relative physical or virtual resources (e.g., C2 servers used in an attack, database servers attacked by an attack, and so on).<\/li>\n<li><strong>Intrusion Set<\/strong>: A collection of adversarial activities and services with similar characteristics that are thought to be coordinated by a single organization.<\/li>\n<li><strong>Location<\/strong>: A geographic location that is represented by this object.<\/li>\n<li><strong>Malware<\/strong>: Malicious code that is represented by this type of TTP.<\/li>\n<\/ul>\n<ul>\n<li><strong>Malware Analysis<\/strong>: The meta-data and its effects are collected by performing a static or dynamic analysis on any malware.<\/li>\n<\/ul>\n<ul>\n<li><strong>Note:<\/strong>\u00a0Provides descriptive text to offer additional meaning and\/or analysis that is not found in the STIX Objects.<\/li>\n<li><strong>Observed Data<\/strong>: Using the STIX Cyber-observable Objects, conveys knowledge about cybersecurity-related organizations such as databases, applications, and networks (SCOs).<\/li>\n<li><strong>Opinion<\/strong>: An assessment of the accuracy of knowledge that is contained in a STIX Object created.<\/li>\n<li><strong>Report<\/strong>: A collection of security intelligence on one or more areas, such as a summary of a threat actor, malware, or attack strategy, as well as background and related data.<\/li>\n<li><strong>Threat Actor<\/strong>: Persons, organizations, or entities who are suspected of acting maliciously.<\/li>\n<li><strong>Tool<\/strong>: Legitimate tools that threaten groups and are used to carry out attacks.<\/li>\n<li><strong>Vulnerability<\/strong>: A flaw in software that a hacker can exploit to obtain access to sensitive information.<\/li>\n<\/ul>\n<p>Two STIX Relationship Objects (SROs) are described in STIX 2:<\/p>\n<ul>\n<li><strong>Relationship<\/strong>: A term that is used to explain how two SDOs or SCOs are connected.<\/li>\n<li><strong>Sighting<\/strong>: The assumption that something in CTI has been identified (e.g., an indication, virus, weapon, threat actor, etc.).<\/li>\n<\/ul>\n<p>&nbsp;<\/p>\n<h4><strong>TAXII<\/strong><\/h4>\n<p>The Trusted Automated Sharing of Intelligence Information (TAXII<sup>TM<\/sup>)is a framework that provides detailed information on how data regarding cyber-threat can be shared using HTTPS via message and service exchange. It was designed to provide extensive support to STIX content.<\/p>\n<p>The three principal models for TAXII include:<\/p>\n<ul>\n<li><strong>Peer to Peer<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-18093 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/12\/Peer-to-peer-\u2013-multiple-groups-share-information.png\" alt=\"Peer-to-peer \u2013 multiple groups share information\" width=\"228\" height=\"131\" \/><\/p>\n<p style=\"text-align: center\">Figure 1 Peer-to-peer \u2013 multiple groups share information<\/p>\n<pre style=\"text-align: center\"><em>Image Source: <\/em><a href=\"https:\/\/www.first.org\/resources\/papers\/munich2016\/wunder-stix-taxii-Overview.pdf\"><em>https:\/\/www.first.org\/resources\/papers\/munich2016\/wunder-stix-taxii-Overview.pdf<\/em><\/a><\/pre>\n<p>Peer to Peer is a sharing method in which two or more organizations communicate and exchange information directly. It can be ad hoc, where information is provided on an as-needed basis without prior coordination.<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Hub and Spoke<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-18094 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/12\/Hib-and-Spoke-\u2013-one-source-as-primary-repository-while-others-facilitate-information-exchange.png\" alt=\"Hib and Spoke \u2013 one source as primary repository while others facilitate information exchange\" width=\"215\" height=\"141\" \/><\/p>\n<p style=\"text-align: center\">Figure 2 Hib and Spoke \u2013 one source as primary repository while others facilitate information exchange<\/p>\n<pre style=\"text-align: center\"><em>Image Source: <\/em><a href=\"https:\/\/www.first.org\/resources\/papers\/munich2016\/wunder-stix-taxii-Overview.pdf\"><em>https:\/\/www.first.org\/resources\/papers\/munich2016\/wunder-stix-taxii-Overview.pdf<\/em><\/a><\/pre>\n<p>Hub and Spoke is a sharing strategy in which one organization serves as the primary repository for information, or hub, while other organizations, or spokes, facilitate information exchange. The Hub can be used to create and\/or consume information by the Spokes.<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li><strong>Source\/Subscriber<\/strong><\/li>\n<\/ul>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-18091 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/12\/Source-or-subscriber-\u2013-one-single-source-of-information.png\" alt=\"Source or subscriber \u2013 one single source of information\" width=\"215\" height=\"158\" \/><\/p>\n<p style=\"text-align: center\">Figure 3 Source\/subscriber \u2013 one single source of information<\/p>\n<pre style=\"text-align: center\"><em>Image Source:<\/em> <a href=\"https:\/\/www.first.org\/resources\/papers\/munich2016\/wunder-stix-taxii-Overview.pdf\"><em>https:\/\/www.first.org\/resources\/papers\/munich2016\/wunder-stix-taxii-Overview.pdf<\/em><\/a><\/pre>\n<p>A source\/subscriber model can be described as one organization that serves as a single source of information and distributes it to subscribers.<\/p>\n<p>&nbsp;<\/p>\n<p>To support the listed\u00a0sharing models, TAXII defines two primary services:<\/p>\n<ul>\n<li><strong>Collection<\/strong> \u2013 It is an interface for a logical registry of CTI objects that is provided by a TAXII Server. Here producer will be hosting a wide range of data, which can be requested by the TAXII Clients and Servers. The exchange of information will take place in a form of the request-response model.<\/li>\n<li><strong>Channel<\/strong> &#8211; It assists the producers to push data into a large number of consumers. Then, the consumers collect data from a large number of producers via a publish-subscribe model in which\u00a0TAXII Clients share information with other TAXII Clients. This whole procedure is managed by TAXII Server.<\/li>\n<\/ul>\n<p>The Channel keywords are reserved in the TAXII 2.1 specification, but its resources are not defined will be defined in a later version of TAXII. Collections and Channels can be set up in a variety of ways and maybe grouped to meet the needs of a specific trust group.<\/p>\n<p>For example, one or more API Roots may be supported by a TAXII server instance. API Roots are considered to be a logical category of TAXII Channels and Collections. It can be considered as instances of the TAXII API which can be accessed at various URLs, with each API Root serving as the \u201croot\u201d URL for that particular instance of TAXII API..<\/p>\n<p>The TAXII uses existing protocols but mostly, they are found within a network that is using DNS Service logs. It also uses HTTPS for all connectivity and HTTP for content negotiation and its authentication.<\/p>\n<p>The sharing of CTI represented in STIX was originally developed for TAXII but the support for exchanging STIX 2.1 content is expected to implement in the coming future for TAXII. On the other hand, TAXII can be used to exchange data in other formats. It\u2019s notable to say that STIX and TAXII are separate standards with different architectures and serializations.<\/p>\n<p>TAXII&#8217;s architecture concepts include minimizing the amount of organizational transition that is required for implementation, fast alignment with current sharing arrangements, and support for all commonly used threat sharing models, which also includes hub-and-spoke, peer-to-peer, and source-subscriber.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18097 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/12\/Primary-Services.png\" alt=\"Primary Services - TAXII Server\" width=\"548\" height=\"184\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/12\/Primary-Services.png 548w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/12\/Primary-Services-300x101.png 300w\" sizes=\"(max-width: 548px) 100vw, 548px\" \/><\/p>\n<p style=\"text-align: center\">Figure 4: Primary Services<\/p>\n<pre style=\"text-align: center\">Image Source: <a href=\"https:\/\/www.anomali.com\/resources\/what-are-stix-taxii\">https:\/\/www.anomali.com\/resources\/what-are-stix-taxii<\/a><\/pre>\n<p>&nbsp;<\/p>\n<h3><strong>Importance of Security Threat Intelligence Standards \u2013 STIX and TAXII<\/strong><strong>:<\/strong><\/h3>\n<p>STIX and TAXII are protocols that were created in an attempt to facilitate the detection and protection of cyber-attacks. They are machine-readable, therefore can be easily standardized, unlike prior ways of sharing. The \u201cwhat\u201d of threat intelligence is defined by STIX, while the \u201chow\u201d is defined by TAXII. It can be said that STIX\/TAXII helps strengthen the security measures:<\/p>\n<p>&nbsp;<\/p>\n<ul>\n<li>Enhancement of the existing threat intelligence sharing capabilities<\/li>\n<li>Maintaining a balanced response between proactive and reactive detection<\/li>\n<li>Encouraging a comprehensive approach to threat intelligence strategy<\/li>\n<\/ul>\n<p>STIX\/TAXII is a transparent, community-driven initiative that offers free requirements to help in the automated expression of cyber threat information.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Use Cases of Security Threat Intelligence Standards \u2013 STIX and TAXII<\/strong><\/h3>\n<p>Many use cases regarding cyber threat management are supported by the STIX\/TAXII. Various government bodies and the Information Sharing &amp; Analysis Centres (ISACs) have adopted them. It ranges in focus from industry to geolocation.<\/p>\n<p>&nbsp;<\/p>\n<h3><strong>Sharing categorized information<\/strong><\/h3>\n<p>Organizations can push and pull information into categories. For example, if one industry has encountered a phishing attack, then they can share this information in the phishing category which comes in the Information Sharing and Analysis Centre (ISAC). This information can directly be utilized by other organizations to enhance their defence systems.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"size-full wp-image-18098 aligncenter\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/12\/Use-Case-Scenario-1.png\" alt=\"Use Case Scenario 1\" width=\"399\" height=\"191\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/12\/Use-Case-Scenario-1.png 399w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/12\/Use-Case-Scenario-1-300x144.png 300w\" sizes=\"(max-width: 399px) 100vw, 399px\" \/><\/p>\n<p style=\"text-align: center\">Figure 5: Use Case Scenario 1<\/p>\n<pre style=\"text-align: center\">Image Source:\u00a0 <a href=\"https:\/\/www.anomali.com\/resources\/what-are-stix-taxii\">https:\/\/www.anomali.com\/resources\/what-are-stix-taxii<\/a><\/pre>\n<p>&nbsp;<\/p>\n<h3><strong>Sharing with Groups<\/strong><\/h3>\n<p>Organizations that have ties with TAXII clients, can pull and push data into the TAXII servers within their trusted sharing groups. Certain groups within these ISACs may have the access to private groups and can easily get more detailed information.<\/p>\n<p><img loading=\"lazy\" decoding=\"async\" class=\"aligncenter wp-image-18099 size-full\" src=\"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/12\/Use-Case-Scenario-2.png\" alt=\"Use Case Scenario - Security Threat Intelligence Standards \u2013 STIX and TAXII\" width=\"392\" height=\"195\" srcset=\"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/12\/Use-Case-Scenario-2.png 392w, https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/12\/Use-Case-Scenario-2-300x149.png 300w\" sizes=\"(max-width: 392px) 100vw, 392px\" \/><\/p>\n<p style=\"text-align: center\">Figure 6: Use Case Scenario 2<\/p>\n<pre style=\"text-align: center\">Image Source: <a href=\"https:\/\/www.anomali.com\/resources\/what-are-stix-taxii\">https:\/\/www.anomali.com\/resources\/what-are-stix-taxi<\/a><\/pre>\n<p>&nbsp;<\/p>\n<h3>References:<\/h3>\n<ol>\n<li><a href=\"https:\/\/oasis-open.github.io\/cti-documentation\/stix\/intro.html\">https:\/\/oasis-open.github.io\/cti-documentation\/stix\/intro.html<\/a><\/li>\n<li><a href=\"https:\/\/www.mitre.org\/capabilities\/cybersecurity\/overview\/cybersecurity-resources\/standards\">https:\/\/www.mitre.org\/capabilities\/cybersecurity\/overview\/cybersecurity-resources\/standards<\/a><\/li>\n<li><a href=\"https:\/\/www.first.org\/resources\/papers\/munich2016\/wunder-stix-taxii-Overview.pdf\">https:\/\/www.first.org\/resources\/papers\/munich2016\/wunder-stix-taxii-Overview.pdf<\/a><\/li>\n<\/ol>\n<p>&nbsp;<\/p>\n<p>Author,<\/p>\n<p><b>Ram Mudigina<\/b><\/p>\n<div class=\"data-block text-nowrap max-w-150 ng-star-inserted\">\n<p class=\"text-truncate\" title=\"Associate - Managed SOC [L1]\">Associate Consultant<\/p>\n<\/div>\n<p>SOCGTM Team,<\/p>\n<p>Varutra Consulting Pvt. Ltd.<\/p>","protected":false},"excerpt":{"rendered":"<p>Introduction: Security Threat Intelligence Standards (STIX and TAXII) make day-to-day SOC operations go uninterrupted with a shared strategy that provides a collaborative response to cybersecurity&#8230;<\/p>\n","protected":false},"author":4,"featured_media":18090,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"om_disable_all_campaigns":false,"inline_featured_image":false,"_monsterinsights_skip_tracking":false,"_monsterinsights_sitenote_active":false,"_monsterinsights_sitenote_note":"","_monsterinsights_sitenote_category":0,"footnotes":""},"categories":[273,274,272],"tags":[577,576,572,407,574,573,575,399],"aioseo_notices":[],"aioseo_head":"\n\t\t<!-- All in One SEO Pro 4.6.3 - aioseo.com -->\n\t\t<meta name=\"description\" content=\"Security Threat Intelligence Standards \u2013 STIX &amp; TAXII are the standards to make day-to-day smooth SOC operations with shared strategy to mitigate cyber risks.\" \/>\n\t\t<meta name=\"robots\" content=\"max-image-preview:large\" \/>\n\t\t<link rel=\"canonical\" href=\"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/\" \/>\n\t\t<meta name=\"generator\" content=\"All in One SEO Pro (AIOSEO) 4.6.3\" \/>\n\t\t<meta property=\"og:locale\" content=\"en_US\" \/>\n\t\t<meta property=\"og:site_name\" content=\"Varutra Consulting\" \/>\n\t\t<meta property=\"og:type\" content=\"article\" \/>\n\t\t<meta property=\"og:title\" content=\"Security Threat Intelligence Standards \u2013 STIX and TAXII\" \/>\n\t\t<meta property=\"og:description\" content=\"Security Threat Intelligence Standards \u2013 STIX &amp; TAXII are the standards to make day-to-day smooth SOC operations with shared strategy to mitigate cyber risks.\" \/>\n\t\t<meta property=\"og:url\" content=\"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/\" \/>\n\t\t<meta property=\"article:tag\" content=\"common vulnerabilities and exposures\" \/>\n\t\t<meta property=\"article:tag\" content=\"mitre\" \/>\n\t\t<meta property=\"article:tag\" content=\"security threat intelligence standards\" \/>\n\t\t<meta property=\"article:tag\" content=\"soc\" \/>\n\t\t<meta property=\"article:tag\" content=\"stix\" \/>\n\t\t<meta property=\"article:tag\" content=\"stix and taxii\" \/>\n\t\t<meta property=\"article:tag\" content=\"taxii\" \/>\n\t\t<meta property=\"article:tag\" content=\"threat intelligence\" \/>\n\t\t<meta property=\"article:published_time\" content=\"2021-12-07T06:35:36+00:00\" \/>\n\t\t<meta property=\"article:modified_time\" content=\"2022-12-02T05:53:30+00:00\" \/>\n\t\t<meta name=\"twitter:card\" content=\"summary_large_image\" \/>\n\t\t<meta name=\"twitter:title\" content=\"Security Threat Intelligence Standards \u2013 STIX and TAXII\" \/>\n\t\t<meta name=\"twitter:description\" content=\"Security Threat Intelligence Standards \u2013 STIX &amp; TAXII are the standards to make day-to-day smooth SOC operations with shared strategy to mitigate cyber risks.\" \/>\n\t\t<meta name=\"twitter:label1\" content=\"Written by\" \/>\n\t\t<meta name=\"twitter:data1\" content=\"kalpblogger\" \/>\n\t\t<meta name=\"twitter:label2\" content=\"Est. reading time\" \/>\n\t\t<meta name=\"twitter:data2\" content=\"8 minutes\" \/>\n\t\t<script type=\"application\/ld+json\" class=\"aioseo-schema\">\n\t\t\t{\"@context\":\"https:\\\/\\\/schema.org\",\"@graph\":[{\"@type\":\"Article\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-threat-intelligence-standards-stix-and-taxii\\\/#article\",\"name\":\"Security Threat Intelligence Standards \\u2013 STIX and TAXII\",\"headline\":\"Security Threat Intelligence Standards \\u2013 STIX and TAXII\",\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/Blogs-Banner-Q4-21-1.png\",\"width\":1200,\"height\":627,\"caption\":\"Security Threat Intelligence Standards \\u2013 STIX and TAXII\"},\"datePublished\":\"2021-12-07T12:05:36+05:30\",\"dateModified\":\"2022-12-02T11:23:30+05:30\",\"inLanguage\":\"en-US\",\"commentCount\":1,\"mainEntityOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-threat-intelligence-standards-stix-and-taxii\\\/#webpage\"},\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-threat-intelligence-standards-stix-and-taxii\\\/#webpage\"},\"articleSection\":\"Security Best Practices, Security Hardening, Web Application Security, Common Vulnerabilities and Exposures, MITRE, Security Threat Intelligence Standards, SOC, STIX, STIX and TAXII, TAXII, Threat Intelligence\"},{\"@type\":\"BreadcrumbList\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-threat-intelligence-standards-stix-and-taxii\\\/#breadcrumblist\",\"itemListElement\":[{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\",\"position\":1,\"name\":\"Home\",\"item\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"nextItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-threat-intelligence-standards-stix-and-taxii\\\/#listItem\"},{\"@type\":\"ListItem\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-threat-intelligence-standards-stix-and-taxii\\\/#listItem\",\"position\":2,\"name\":\"Security Threat Intelligence Standards \\u2013 STIX and TAXII\",\"previousItem\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#listItem\"}]},{\"@type\":\"Organization\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\",\"name\":\"Varutra\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"logo\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/wp-content\\\/uploads\\\/2021\\\/11\\\/Varutra-Found-e1612984024606.jpg\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-threat-intelligence-standards-stix-and-taxii\\\/#organizationLogo\"},\"image\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-threat-intelligence-standards-stix-and-taxii\\\/#organizationLogo\"}},{\"@type\":\"Person\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/\",\"name\":\"kalpblogger\",\"image\":{\"@type\":\"ImageObject\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-threat-intelligence-standards-stix-and-taxii\\\/#authorImage\",\"url\":\"https:\\\/\\\/secure.gravatar.com\\\/avatar\\\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g\",\"width\":96,\"height\":96,\"caption\":\"kalpblogger\"}},{\"@type\":\"WebPage\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-threat-intelligence-standards-stix-and-taxii\\\/#webpage\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-threat-intelligence-standards-stix-and-taxii\\\/\",\"name\":\"Security Threat Intelligence Standards \\u2013 STIX and TAXII\",\"description\":\"Security Threat Intelligence Standards \\u2013 STIX & TAXII are the standards to make day-to-day smooth SOC operations with shared strategy to mitigate cyber risks.\",\"inLanguage\":\"en-US\",\"isPartOf\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\"},\"breadcrumb\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-threat-intelligence-standards-stix-and-taxii\\\/#breadcrumblist\"},\"author\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"creator\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/author\\\/kalpblogger\\\/#author\"},\"image\":{\"@type\":\"ImageObject\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/wp-content\\\/uploads\\\/2021\\\/12\\\/Blogs-Banner-Q4-21-1.png\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-threat-intelligence-standards-stix-and-taxii\\\/#mainImage\",\"width\":1200,\"height\":627,\"caption\":\"Security Threat Intelligence Standards \\u2013 STIX and TAXII\"},\"primaryImageOfPage\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/security-threat-intelligence-standards-stix-and-taxii\\\/#mainImage\"},\"datePublished\":\"2021-12-07T12:05:36+05:30\",\"dateModified\":\"2022-12-02T11:23:30+05:30\"},{\"@type\":\"WebSite\",\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#website\",\"url\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/\",\"name\":\"Varutra Consulting\",\"description\":\"Secure your digital world with our Cybersecurity services.\",\"inLanguage\":\"en-US\",\"publisher\":{\"@id\":\"https:\\\/\\\/www.varutra.com\\\/varutravrt3\\\/#organization\"}}]}\n\t\t<\/script>\n\t\t<!-- All in One SEO Pro -->\r\n\t\t<title>Security Threat Intelligence Standards \u2013 STIX and TAXII<\/title>\n\n","aioseo_head_json":{"title":"Security Threat Intelligence Standards \u2013 STIX and TAXII","description":"Security Threat Intelligence Standards \u2013 STIX & TAXII are the standards to make day-to-day smooth SOC operations with shared strategy to mitigate cyber risks.","canonical_url":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/","robots":"max-image-preview:large","keywords":"","webmasterTools":{"miscellaneous":""},"og:locale":"en_US","og:site_name":"Varutra Consulting","og:type":"article","og:title":"Security Threat Intelligence Standards \u2013 STIX and TAXII","og:description":"Security Threat Intelligence Standards \u2013 STIX &amp; TAXII are the standards to make day-to-day smooth SOC operations with shared strategy to mitigate cyber risks.","og:url":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/","article:tag":["common vulnerabilities and exposures","mitre","security threat intelligence standards","soc","stix","stix and taxii","taxii","threat intelligence"],"article:published_time":"2021-12-07T06:35:36+00:00","article:modified_time":"2022-12-02T05:53:30+00:00","twitter:card":"summary_large_image","twitter:title":"Security Threat Intelligence Standards \u2013 STIX and TAXII","twitter:description":"Security Threat Intelligence Standards \u2013 STIX &amp; TAXII are the standards to make day-to-day smooth SOC operations with shared strategy to mitigate cyber risks.","twitter:label1":"Written by","twitter:data1":"kalpblogger","twitter:label2":"Est. reading time","twitter:data2":"8 minutes","schema":{"@context":"https:\/\/schema.org","@graph":[{"@type":"Article","@id":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/#article","name":"Security Threat Intelligence Standards \u2013 STIX and TAXII","headline":"Security Threat Intelligence Standards \u2013 STIX and TAXII","author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/12\/Blogs-Banner-Q4-21-1.png","width":1200,"height":627,"caption":"Security Threat Intelligence Standards \u2013 STIX and TAXII"},"datePublished":"2021-12-07T12:05:36+05:30","dateModified":"2022-12-02T11:23:30+05:30","inLanguage":"en-US","commentCount":1,"mainEntityOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/#webpage"},"isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/#webpage"},"articleSection":"Security Best Practices, Security Hardening, Web Application Security, Common Vulnerabilities and Exposures, MITRE, Security Threat Intelligence Standards, SOC, STIX, STIX and TAXII, TAXII, Threat Intelligence"},{"@type":"BreadcrumbList","@id":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/#breadcrumblist","itemListElement":[{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/#listItem","position":1,"name":"Home","item":"https:\/\/www.varutra.com\/varutravrt3\/","nextItem":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/#listItem"},{"@type":"ListItem","@id":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/#listItem","position":2,"name":"Security Threat Intelligence Standards \u2013 STIX and TAXII","previousItem":"https:\/\/www.varutra.com\/varutravrt3\/#listItem"}]},{"@type":"Organization","@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization","name":"Varutra","url":"https:\/\/www.varutra.com\/varutravrt3\/","logo":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/wp-content\/uploads\/2021\/11\/Varutra-Found-e1612984024606.jpg","@id":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/#organizationLogo"},"image":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/#organizationLogo"}},{"@type":"Person","@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author","url":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/","name":"kalpblogger","image":{"@type":"ImageObject","@id":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/#authorImage","url":"https:\/\/secure.gravatar.com\/avatar\/5e96a9b330da7c941c1e39217a2fbe38?s=96&d=mm&r=g","width":96,"height":96,"caption":"kalpblogger"}},{"@type":"WebPage","@id":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/#webpage","url":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/","name":"Security Threat Intelligence Standards \u2013 STIX and TAXII","description":"Security Threat Intelligence Standards \u2013 STIX & TAXII are the standards to make day-to-day smooth SOC operations with shared strategy to mitigate cyber risks.","inLanguage":"en-US","isPartOf":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#website"},"breadcrumb":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/#breadcrumblist"},"author":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"creator":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/author\/kalpblogger\/#author"},"image":{"@type":"ImageObject","url":"https:\/\/www.varutra.com\/varutravrt3\/wp-content\/uploads\/2021\/12\/Blogs-Banner-Q4-21-1.png","@id":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/#mainImage","width":1200,"height":627,"caption":"Security Threat Intelligence Standards \u2013 STIX and TAXII"},"primaryImageOfPage":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/#mainImage"},"datePublished":"2021-12-07T12:05:36+05:30","dateModified":"2022-12-02T11:23:30+05:30"},{"@type":"WebSite","@id":"https:\/\/www.varutra.com\/varutravrt3\/#website","url":"https:\/\/www.varutra.com\/varutravrt3\/","name":"Varutra Consulting","description":"Secure your digital world with our Cybersecurity services.","inLanguage":"en-US","publisher":{"@id":"https:\/\/www.varutra.com\/varutravrt3\/#organization"}}]}},"aioseo_meta_data":{"post_id":"18088","title":"Security Threat Intelligence Standards \u2013 STIX and TAXII","description":"Security Threat Intelligence Standards \u2013 STIX &amp; TAXII&nbsp;are the standards to make day-to-day smooth SOC operations with shared strategy to mitigate cyber risks.","keywords":[],"keyphrases":"{\"focus\":{\"keyphrase\":\"Threat Intelligence Standards\",\"score\":90,\"analysis\":{\"keyphraseInTitle\":{\"title\":\"Focus keyphrase in SEO title\",\"description\":\"Focus keyphrase found in SEO title.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInDescription\":{\"title\":\"Focus keyphrase in meta description\",\"description\":\"Focus keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Focus keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInURL\":{\"title\":\"Focus keyphrase in URL\",\"description\":\"Focus keyphrase used in the URL.\",\"score\":5,\"maxScore\":5,\"error\":0},\"keyphraseInIntroduction\":{\"title\":\"Focus keyphrase in introduction\",\"description\":\"Your Focus keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInSubHeadings\":{\"title\":\"Focus keyphrase in Subheadings\",\"description\":\"Your H2 and H3 subheadings reflects the topic of your copy. Good job!\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseInImageAlt\":{\"title\":\"Focus keyphrase in image alt attributes\",\"description\":\"Focus keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},\"additional\":[{\"keyphrase\":\"Security Threat Intelligence Standards\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":4},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Threat Intelligence\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":2},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Security Threat Intelligence\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":3},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"Standards\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"STIX\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}},{\"keyphrase\":\"TAXII\",\"score\":83,\"analysis\":{\"keyphraseInDescription\":{\"title\":\"Keyphrase in meta description\",\"description\":\"Keyphrase found in meta description.\",\"score\":9,\"maxScore\":9,\"error\":0},\"keyphraseLength\":{\"title\":\"Keyphrase length\",\"description\":\"Good job!\",\"score\":9,\"maxScore\":9,\"error\":0,\"length\":1},\"keyphraseInIntroduction\":{\"title\":\"Keyphrase in introduction\",\"description\":\"Your Keyphrase does not appear in the first paragraph. Make sure the topic is clear immediately.\",\"score\":3,\"maxScore\":9,\"error\":1},\"keyphraseInImageAlt\":{\"title\":\"Keyphrase in image alt attributes\",\"description\":\"Keyphrase found in image alt attribute(s).\",\"score\":9,\"maxScore\":9,\"error\":0}}}]}","primary_term":null,"canonical_url":null,"og_title":null,"og_description":null,"og_object_type":"default","og_image_type":"default","og_image_url":null,"og_image_width":null,"og_image_height":null,"og_image_custom_url":null,"og_image_custom_fields":null,"og_video":"","og_custom_url":null,"og_article_section":null,"og_article_tags":[],"twitter_use_og":false,"twitter_card":"default","twitter_image_type":"default","twitter_image_url":null,"twitter_image_custom_url":null,"twitter_image_custom_fields":null,"twitter_title":null,"twitter_description":null,"schema":{"blockGraphs":[],"customGraphs":[],"default":{"data":{"Article":[],"Course":[],"Dataset":[],"FAQPage":[],"Movie":[],"Person":[],"Product":[],"Recipe":[],"Service":[],"SoftwareApplication":[],"WebPage":[]},"graphName":"","isEnabled":true},"graphs":[]},"schema_type":"default","schema_type_options":"{\"article\":{\"articleType\":\"BlogPosting\"},\"course\":{\"name\":\"\",\"description\":\"\",\"provider\":\"\"},\"faq\":{\"pages\":[]},\"product\":{\"reviews\":[]},\"recipe\":{\"ingredients\":[],\"instructions\":[],\"keywords\":[]},\"software\":{\"reviews\":[],\"operatingSystems\":[]},\"webPage\":{\"webPageType\":\"WebPage\"}}","pillar_content":false,"robots_default":true,"robots_noindex":false,"robots_noarchive":false,"robots_nosnippet":false,"robots_nofollow":false,"robots_noimageindex":false,"robots_noodp":false,"robots_notranslate":false,"robots_max_snippet":"-1","robots_max_videopreview":"-1","robots_max_imagepreview":"large","priority":null,"frequency":"default","local_seo":null,"limit_modified_date":false,"open_ai":null,"created":"2021-12-07 05:48:36","updated":"2022-12-02 05:56:19"},"aioseo_breadcrumb":"<div class=\"aioseo-breadcrumbs\"><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\" title=\"Home\">Home<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\t<a href=\"https:\/\/www.varutra.com\/varutravrt3\/category\/security-best-practices\/\" title=\"Security Best Practices\">Security Best Practices<\/a>\n<\/span><span class=\"aioseo-breadcrumb-separator\">&raquo;<\/span><span class=\"aioseo-breadcrumb\">\n\tSecurity Threat Intelligence Standards \u2013 STIX and TAXII\n<\/span><\/div>","aioseo_breadcrumb_json":[{"label":"Home","link":"https:\/\/www.varutra.com\/varutravrt3"},{"label":"Security Best Practices","link":"https:\/\/www.varutra.com\/varutravrt3\/category\/security-best-practices\/"},{"label":"Security Threat Intelligence Standards \u2013 STIX and TAXII","link":"https:\/\/www.varutra.com\/varutravrt3\/security-threat-intelligence-standards-stix-and-taxii\/"}],"post_mailing_queue_ids":[],"_links":{"self":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/18088"}],"collection":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/users\/4"}],"replies":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/comments?post=18088"}],"version-history":[{"count":5,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/18088\/revisions"}],"predecessor-version":[{"id":20209,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/posts\/18088\/revisions\/20209"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media\/18090"}],"wp:attachment":[{"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/media?parent=18088"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/categories?post=18088"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/www.varutra.com\/varutravrt3\/wp-json\/wp\/v2\/tags?post=18088"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}