Skip to main content

STIX Data Model

ELLIO indicators are delivered as STIX 2.1 objects. This page describes the data model, including the custom extension that carries rich context from the ELLIO Deception Network.

Object Types

The TAXII feed serves the following STIX 2.1 object types:

TypeDescription
indicatorIP threat indicator with pattern, confidence, and enrichment data
identityELLIO Technology identity and known actor/scanner identities
relationshipLinks between indicators and actor identities (attributed-to)
extension-definitionSchema definition for the ELLIO enrichment extension
marking-definitionTLP:AMBER marking (data is for subscriber use only, not third-party sharing)

Indicator Structure

Each indicator represents a single IP address observed by the ELLIO Deception Network.

Core Fields

FieldDescriptionExample
idDeterministic STIX UUID (stable across updates)indicator--a5ad84e7-b730-5dbd-8710-a7c714bf6e76
nameClassification and IPMalicious IP 203.0.113.1
patternSTIX pattern for Sentinel matching[ipv4-addr:value = '203.0.113.1']
confidence1-100 based on recency of last observation95
indicator_typesClassification-based typemalicious-activity, anomalous-activity, benign, unknown
valid_fromFirst observation date2026-01-15T00:00:00Z
valid_untilExpiration (last_seen + 90 days)2026-06-08T00:00:00Z
createdDate of first observation2026-01-15T00:00:00Z
modifiedDate of last observation2026-03-10T00:00:00Z
labelsTags from the ELLIO Deception Network["scanner", "brute-force"]

Confidence Scoring

  • Non-spoofable indicators: Linear decay from 100 (seen today) to 1 (seen 100+ days ago)
  • Spoofable indicators: Always 1 (source IP is unverified)

Kill Chain Phases

Indicators include kill chain classifications from two frameworks:

Lockheed Martin Cyber Kill Chain: reconnaissance, delivery, exploitation, installation, command-and-control

MITRE ATT&CK Tactics: initial-access, execution, persistence, privilege-escalation, defense-evasion, credential-access, discovery, lateral-movement, collection, exfiltration, command-and-control, impact, resource-development, reconnaissance

External References

Each indicator links to:

  • ELLIO Platform: Direct link to the IP's detail page (https://platform.ellio.tech/dashboard/cti/ip/{ip})
  • CVE references: NVD links for associated vulnerabilities
  • MITRE ATT&CK techniques: Links to technique descriptions

ELLIO Enrichment Extension

Each indicator carries a custom STIX property-extension with detailed context from the ELLIO Deception Network. This data is stored in Sentinel's Data column and is queryable via KQL.

Extension Definition ID: extension-definition--9fcc6545-c018-5dbe-90a8-86fc02af8b34

Schema: https://taxii-sentinel.ellio.tech/schema/extensions/enrichment/v1

Extension Fields

FieldTypeDescription
spoofablebooleanWhether the source IP could be spoofed (no TCP handshake confirmed)
classificationstringmalicious, promiscuous, benign, or unknown
active_daysintegerNumber of distinct days the IP was observed within the last 90-day window
first_seendateFirst observation date
last_seendateMost recent observation date
tag_idsstring[]Internal tag identifiers for programmatic use
src_geoobjectSource geolocation (country, city, coordinates)
src_asnobjectSource AS number and name
rdnsstringReverse DNS hostname
fingerprintsobjectNetwork fingerprints (MuonFP, JA4, JA3)
portsinteger[]All targeted ports
non_spoofable_portsinteger[]Ports with confirmed TCP handshake
spoofable_portsinteger[]Ports without confirmed TCP handshake
httpobjectObserved HTTP request details (paths, user agents)
ssh_credentialsarraySSH brute-force authentication attempts
dst_geoarrayDestination geolocations of targeted sensors

Source Geolocation (src_geo)

FieldTypeExample
country_codestringCN
country_namestringChina
continent_codestringAS
citystringBeijing
latitudenumber39.9042
longitudenumber116.4074

Source ASN (src_asn)

FieldTypeExample
numberinteger4134
namestringCHINANET-BACKBONE

Network Fingerprints (fingerprints)

Network fingerprints observed during interactions with ELLIO sensors:

FieldDescription
muonfpMuonFP TCP stack fingerprint
ja4JA4 TLS fingerprint
ja3JA3 TLS fingerprint

Example Indicator

{
"type": "indicator",
"spec_version": "2.1",
"id": "indicator--a5ad84e7-b730-5dbd-8710-a7c714bf6e76",
"created_by_ref": "identity--043070bd-a674-576c-ad22-ff5c20c9217f",
"created": "2026-01-15T00:00:00Z",
"modified": "2026-03-10T00:00:00Z",
"name": "Malicious IP 203.0.113.1",
"description": "Malicious IP 203.0.113.1 observed by ELLIO Deception Network. Active 30 day(s) between 2026-01-15 and 2026-03-10. TCP handshake confirmed (non-spoofable). Tags: scanner, brute-force. Origin: Beijing, China, AS4134 CHINANET-BACKBONE. https://platform.ellio.tech/dashboard/cti/ip/203.0.113.1",
"pattern": "[ipv4-addr:value = '203.0.113.1']",
"pattern_type": "stix",
"valid_from": "2026-01-15T00:00:00Z",
"valid_until": "2026-06-08T00:00:00Z",
"confidence": 95,
"indicator_types": ["malicious-activity"],
"labels": ["scanner", "brute-force"],
"object_marking_refs": [
"marking-definition--f88d31f6-486f-44da-b317-01333bde0b82"
],
"kill_chain_phases": [
{
"kill_chain_name": "lockheed-martin-cyber-kill-chain",
"phase_name": "reconnaissance"
},
{
"kill_chain_name": "mitre-attack",
"phase_name": "reconnaissance"
}
],
"external_references": [
{
"source_name": "ELLIO Deception Network",
"url": "https://platform.ellio.tech/dashboard/cti/ip/203.0.113.1"
},
{
"source_name": "cve",
"external_id": "CVE-2024-1234",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2024-1234"
},
{
"source_name": "mitre-attack",
"external_id": "T1595",
"url": "https://attack.mitre.org/techniques/T1595/"
}
],
"extensions": {
"extension-definition--9fcc6545-c018-5dbe-90a8-86fc02af8b34": {
"extension_type": "property-extension",
"spoofable": false,
"classification": "malicious",
"active_days": 30,
"first_seen": "2026-01-15",
"last_seen": "2026-03-10",
"tag_ids": ["scanner", "brute_force"],
"src_geo": {
"country_code": "CN",
"country_name": "China",
"continent_code": "AS",
"city": "Beijing",
"latitude": 39.9042,
"longitude": 116.4074
},
"src_asn": {
"number": 4134,
"name": "CHINANET-BACKBONE"
},
"rdns": "scanner.example.net",
"fingerprints": {
"muonfp": ["65535:2-1-3-1-1-4:1460:8"],
"ja4": "t13d1516h2_8daaf6152771_02713d6af862"
},
"ports": [22, 80, 443, 8080],
"non_spoofable_ports": [22, 80, 443],
"spoofable_ports": [8080],
"ssh_credentials": [
{"username": "root", "password": "admin123"}
],
"dst_geo": [
{
"country_code": "US",
"country_name": "United States",
"city": "Ashburn"
}
]
}
}
}

Actor Attribution

Known scanners and research organizations are represented as STIX identity objects linked to indicators via attributed-to relationships. This enables filtering by actor in KQL queries.

Currently attributed actors include commercial scanners (Shodan, Censys, BinaryEdge), search engine crawlers (Googlebot, Bingbot), and research organizations (Shadowserver, CERT-FR).