Turn card numbers into STIX 2.1 objects. Enrich the data with issuer information. Track transactions made by the card. Then link the cards and transactions to other STIX objects in your research (Actors, Incidents, etc.).| DOGESEC
I recently conducted a project to identify the most prolific ransomware based on the ransom payments being made. Let me walk you through how I did it.| DOGESEC
Take the list of recognised countries and regions. Create STIX objects for them. Make them available to everyone so that the CTI world has a single way of representing them.| DOGESEC
Netwalker| attack.mitre.org