top of page

Your $200K Security Tool Has a STIX Import Button. Here's the Free Feed It's Been Waiting For.

  • Writer: Patrick Duggan
    Patrick Duggan
  • Jan 6
  • 3 min read


The Button Nobody Clicks


You bought the platform. CrowdStrike, Palo Alto, Microsoft Sentinel, IBM QRadar, OpenCTI - doesn't matter which. Somewhere in the settings, there's a button that says "Add STIX/TAXII Feed."


You've probably never clicked it.


Not because you don't want more threat intelligence. Because when you go looking for feeds to add, you find:


  • Vendor's own feed: $50K/year extra

  • AlienVault OTX: Still on STIX 1.x (a different format)

  • MITRE ATT&CK: Knowledge base, zero IOCs

  • abuse.ch feeds: JSON, not STIX

  • CINS Army: Plain text IP list

  • Everything else: CSV files you'd have to transform yourself

So the button sits there. Waiting.





We Went Looking


We spent an afternoon doing what you probably did: searching for free STIX 2.1 threat intelligence feeds.


Here's what we found:



Feed

Format

Actionable IOCs

STIX 2.1?

AlienVault OTX

STIX 1.x

Yes

No

MITRE ATT&CK

STIX 2.1

No (knowledge only)

Yes

Feodo Tracker

JSON

4 active C2s

No

ThreatFox

JSON/API

Yes

No

CINS Army

Plain text

15,000 IPs

No

URLhaus

JSON

Yes

No


Zero free STIX 2.1 feeds with actionable IOCs and full graph structure.


The enterprise platforms support STIX 2.1 because enterprise customers check that compliance box. But the actual feeds? Paywalled at $50K-$500K/year.





Why the Gap Exists


STIX 2.1 is the format. Everyone agrees on it. OASIS published the spec. IBM, Microsoft, Palo Alto, CrowdStrike - they all implemented it.


But here's the thing: threat intelligence is a product. The vendors selling $50K feeds aren't going to give them away. And the open-source community? They're publishing in whatever format is easiest (JSON, CSV, plain text).


  1. Collecting IOCs from multiple sources

  2. Correlating and deduplicating

  3. Enriching with threat actor attribution

  4. Adding kill chain phases

  5. Building relationship graphs

  6. Outputting as proper STIX 2.1 bundles

Until now.





What We Built


DugganUSA STIX Feed: https://analytics.dugganusa.com/api/v1/stix-feed


A real STIX 2.1 bundle with:



Object Type

Count

What It Is

indicator

1,000+/day

Actual IP addresses you can block

threat-actor

399

APT groups with attribution

campaign

Active

Inferred from malware families

infrastructure

Bulletproof hosting, proxies

ISP-level threat data

sighting

500+

When we observed each indicator

relationship

600+

Graph connections between objects

attack-pattern

16

Supply chain TTPs mapped to MITRE


Sources: AbuseIPDB, VirusTotal, ThreatFox, OTX, plus our own honeypot network.


Cost: Free. Actually free. No API key required.





How to Use It



Microsoft Sentinel



Settings → Data Connectors → Threat Intelligence - TAXII
URL: https://analytics.dugganusa.com/api/v1/stix-feed
Polling frequency: 1 hour



OpenCTI



# docker-compose.yml
- TAXII2_URL=https://analytics.dugganusa.com/api/v1/stix-feed
- TAXII2_INTERVAL=3600



CrowdStrike Falcon



Support → API Clients → STIX/TAXII Integration
Discovery URL: https://analytics.dugganusa.com/api/v1/stix-feed



curl (for the skeptics)



curl -s "https://analytics.dugganusa.com/api/v1/stix-feed?days=7" | jq '.objects | length'
# Returns: 2500+



Parameters



Parameter

Default

Description

days

30

How far back to pull

limit

none

Cap the number of indicators

min_confidence

30

Filter by confidence score

format

bundle

STIX 2.1 bundle





What You Get


Every indicator includes:



{
  "type": "indicator",
  "pattern": "[ipv4-addr:value = '45.148.10.242']",
  "confidence": 95,
  "kill_chain_phases": [
    {"kill_chain_name": "mitre-attack", "phase_name": "command-and-control"}
  ],
  "x_dugganusa_threat_intel": {
    "abuse_score": 100,
    "malware_family": "Cobalt Strike",
    "isp": "TECHOFF-HOSTING",
    "country": "RU"
  }
}


Plus relationship objects linking indicators to threat actors:



{
  "type": "relationship",
  "relationship_type": "attributed-to",
  "source_ref": "indicator--abc123",
  "target_ref": "threat-actor--def456",
  "confidence": 70
}


This isn't a flat list of IPs. It's a graph you can query.





Why Free?


Because we're not a threat intel company. We're a security operations company that built this infrastructure for ourselves and realized nobody else was publishing it.


Our business is the $77/month security dashboard at security.dugganusa.com. The STIX feed is what happens when you open-source your data pipeline.


Also: we think threat intelligence being locked behind $50K/year paywalls is part of why security is losing. The attackers share freely. Defenders should too.





The Fine Print


  • License: CC0-1.0 (public domain, do whatever you want)

  • Attribution: Appreciated but not required

  • SLA: Best effort (it's free)

  • Rate limits: Don't abuse it

  • Format: STIX 2.1 bundle, JSON




Try It


Right now. Takes 30 seconds.



curl -s "https://analytics.dugganusa.com/api/v1/stix-feed?days=1" | jq '.objects | group_by(.type) | map({type: .[0].type, count: length})'


Then go click that button in your $200K security platform. It finally has something to import.




DugganUSA LLC operates threat intelligence infrastructure from Minnesota at $75/month. We believe in sharing what we learn.



Comments

Rated 0 out of 5 stars.
No ratings yet

Add a rating
bottom of page