A post full of code examples that will give you everything you need to start creating STIX objects to make it simple to share your threat research.| dogesec
The OASIS Cyber Threat Intelligence (CTI) TC supports automated information sharing for cybersecurity situational awareness, real-time network defense, and sophisticated threat analysis.| oasis-open.github.io
Sometimes the default STIX 2.1 objects will not be broad enough for your needs. This post describes how you can extend the STIX specification when required.| dogesec
STIX 2.1 allows you to tell stories by connecting objects together to form the story-line of cyber actors, campaigns, incidents, and much more. In this post I explain how.| dogesec
STIX is an open standard describing objects of interest in the field of defensive computer warfare, and the links they can maintain between them.| Sekoia.io
Take the list of recognised countries and regions. Create STIX objects for them. Make them available to everyone so that the CTI world has a single way of representing them.| DOGESEC
The OASIS Cyber Threat Intelligence (CTI) TC supports automated information sharing for cybersecurity situational awareness, real-time network defense, and sophisticated threat analysis.| oasis-open.github.io