Python Script for Converting First Watch Malicious Domains to STIX 2.1 | WhoisXML API

Python Script for Transforming Domain Names from First Watch Malicious Domains Data Feed into STIX 2.1

WhoisXML API recently created a Python script to help users of First Watch Malicious Domains Data Feed, also known as “First Watch,” transform predictive domain intelligence into a machine-readable format—STIX 2.1—for automated data processing.

The script reads domain names from First Watch files, converts them to STIX 2.1 Indicator objects with domain-name observable types, and generates a TAXII 2.1-compatible STIX bundle. The output is downloadable as a JSON file in TAXII format.

For further information on our scripts or to submit a script idea that suits your requirements, please contact [email protected].

How the Script Can Help First Watch Users

With the help of this script, First Watch users aiming to integrate threat intelligence into their security solutions and processes can experience:

  • Automated data processing: The script reads domain names directly from a text or CSV file, making it easier to work with raw First Watch feed data. And since it generates a TAXII 2.1-compatible STIX bundle, it enables organizations to automate the ingestion and sharing of threat intelligence.
  • Better threat intelligence sharing: The script converts the data feed into STIX 2.1 Indicator objects, a widely used standard format for threat intelligence platforms (TIPs), SIEM platforms, SOAR systems, and other cybersecurity tools. 
  • Flexible output format: By default, the script generates a compact JSON file (ideal for automation) but users can also enable human-readable formatting with the --pretty flag for easier manual inspection.

Access the latest version of our script to easily convert First Watch domain lists to STIX 2.1 Indicator objects on GitHub.

Try our WhoisXML API for free
Get started