A post full of code examples that will give you everything you need to start creating STIX objects to make it simple to share your threat research.| dogesec
If you’re a cyber threat intelligence analyst you probably use txt2stix, but do you know everything it’s currently capable of?| dogesec
Sometimes the default STIX 2.1 objects will not be broad enough for your needs. This post describes how you can extend the STIX specification when required.| dogesec
STIX 2.1 allows you to tell stories by connecting objects together to form the story-line of cyber actors, campaigns, incidents, and much more. In this post I explain how.| dogesec
This document describes the STIX language for expressing cyber threat and observable information and defines its concepts and overall structure.| docs.oasis-open.org