> SIEM Integration_

Native STIX 2.1 Support.
Direct SIEM Integration.

DarkStrata is the only credential exposure platform with native STIX/TAXII support. Feed structured threat intelligence directly into your SIEM without custom parsing or transformation.

OASIS STIX 2.1 Compliant

Fully standards-compliant bundles

Splunk ES Compatible

Observed-data format for Splunk

Incremental Sync

Timestamp-based filtering

Privacy Controls

Email hashing and confidence filtering

STIX Object Types

DarkStrata maps credential exposure data to standard STIX 2.1 objects

Report

Credential exposure alerts become STIX Report objects — container documents that group related indicators, identities, and relationships.

OrganisationAlert

Indicator

Compromised credentials become STIX Indicators with patterns like [user-account:account_login = 'email'] for automated SIEM detection.

DomainDataMatches

Identity

Compromised users become STIX Identity objects for correlation with Active Directory, Azure AD, and other identity systems.

DomainDataIdentifier

Observed-Data

Splunk ES compatible format — credentials as observed-data objects with embedded user-account and domain-name SCOs.

Splunk ES Format

Relationship

STIX Relationship objects connect indicators to identities, providing full context for threat analysis.

indicates → identity

STIX Endpoints

RESTful API endpoints for exporting STIX bundles

EndpointMethodDescription
/api/v1/stix/alertsGETList credential exposure alerts as STIX bundles with pagination
/api/v1/stix/alerts/:idGETSingle alert as complete STIX bundle
/api/v1/stix/indicatorsGETAll credential indicators as flat bundle (up to 500/page)

Query Parameters

ParameterTypeDescription
sinceISO 8601Fetch data since this timestamp (incremental sync)
detailsummary | fullLevel of detail in response bundles
includeCSVInclude additional objects: identities
formatstix21 | splunkOutput format — use splunk for observed-data
hash_emailsbooleanSHA-256 hash email addresses for privacy
confidence_threshold0-100Minimum STIX confidence score to include
page / limitintegerPagination (limits: 10-100 alerts, 100-500 indicators)

Confidence Mapping

DarkStrata threat scores map to STIX confidence values

DarkStrata LevelSeveritySTIX Confidence
1Info20
2Needs Review40
3Medium60
4High80
5Critical100

Custom Extension

DarkStrata-specific metadata in STIX property extension

Industry-First STIX Extension

Purpose-built extension for credential exposure intelligence within the STIX 2.1 standard.

STIX Docs

Track whether credentials were exposed via infostealer malware or a data breach.

Source

Distinguish employee credentials (outbound) from customer credentials (inbound).

Flow

1-5 severity rating based on password strength, source recency, and credential type.

Threat Score
extension-definition.json
{
  "type": "extension-definition",
  "id": "extension-definition--d6132570-7659-4922-9fc4-420e4f8cba63",
  "spec_version": "2.1",
  "created": "2025-01-01T00:00:00.000Z",
  "modified": "2025-01-01T00:00:00.000Z",
  "name": "DarkStrata Credential Exposure Extension",
  "schema": "https://api.darkstrata.io/v1/stix/extensions/credential-exposure/v1",
  "version": "1.0.0",
  "extension_types": ["property-extension"],
  "extension_properties": {
    "x_darkstrata_credential": {
      "source": "MALWARE | BREACH",
      "flow": "INBOUND | OUTBOUND",
      "service_url": "Domain where credentials were exposed",
      "threat_score": "1-5 severity level",
      "password_strength": "weak | medium | strong",
      "credential_type": "EP (email/password) | UP (username/password)",
      "discovered_at": "ISO 8601 timestamp",
      "alert_id": "DarkStrata alert UUID (optional)",
      "asset_hostname": "Monitored asset hostname (optional)"
    }
  }
}

Example Bundle

Sample STIX 2.1 bundle for a credential exposure indicator

stix-bundle.json
{
  "type": "bundle",
  "id": "bundle--f9b2fd53-4335-4b51-a84c-ef1234567890",
  "objects": [
    {
      "type": "indicator",
      "spec_version": "2.1",
      "id": "indicator--550e8400-e29b-41d4-a716-446655440001",
      "created": "2025-01-15T09:00:00.000Z",
      "modified": "2025-01-15T09:00:00.000Z",
      "name": "Compromised credential: j.smith@acme.com on slack.com",
      "description": "Email/password pair exposed via infostealer malware for slack.com.",
      "indicator_types": ["compromised"],
      "pattern": "[user-account:account_login = 'j.smith@acme.com']",
      "pattern_type": "stix",
      "valid_from": "2025-01-14T00:00:00.000Z",
      "confidence": 80,
      "labels": ["darkstrata", "credential-exposure", "source:malware", "flow:outbound", "severity-high"],
      "extensions": {
        "extension-definition--d6132570-7659-4922-9fc4-420e4f8cba63": {
          "extension_type": "property-extension",
          "x_darkstrata_credential": {
            "source": "MALWARE",
            "flow": "OUTBOUND",
            "service_url": "https://slack.com",
            "threat_score": 4,
            "password_strength": "weak",
            "credential_type": "EP",
            "discovered_at": "2025-01-14T00:00:00.000Z"
          }
        }
      }
    },
    {
      "type": "identity",
      "spec_version": "2.1",
      "id": "identity--550e8400-e29b-41d4-a716-446655440002",
      "created": "2025-01-15T09:00:00.000Z",
      "modified": "2025-01-15T09:00:00.000Z",
      "name": "j.smith@acme.com",
      "identity_class": "individual",
      "sectors": ["corporate"]
    },
    {
      "type": "relationship",
      "spec_version": "2.1",
      "id": "relationship--550e8400-e29b-41d4-a716-446655440003",
      "created": "2025-01-15T09:00:00.000Z",
      "modified": "2025-01-15T09:00:00.000Z",
      "relationship_type": "indicates",
      "source_ref": "indicator--550e8400-e29b-41d4-a716-446655440001",
      "target_ref": "identity--550e8400-e29b-41d4-a716-446655440002"
    }
  ]
}

Platform Compatibility

Works with major SIEM and threat intelligence platforms

Splunk
Splunk ES
Observed-data format
Sentinel
TAXII connector
Elastic
Elastic
STIX integration
OpenCTI
STIX native

TAXII 2.1 Coming Soon

TAXII 2.1 server endpoints are in development for automated threat intelligence feeds. This will enable direct connector integration with Microsoft Sentinel and other platforms that support TAXII polling.

Server discovery endpoint
Collection-based organisation
Automatic polling support

Ready to Integrate Your SIEM?

Start exporting credential intelligence in STIX format today