A post full of code examples that will give you everything you need to start creating STIX objects to make it simple to share your threat research.| dogesec