This site is a work in progress. Check back soon for more content.
-- [Part 2: STIX Objects](https://docs.google.com/document/d/1IvkLxg_tCnICsatu2lyxKmWmh1gY2h8HUNssKIE-UIA/pub)
- [Part 3: Cyber Observable Core Concepts](https://docs.google.com/document/d/1ti4Ei_ii_Uc4izHNZlYmBP9NgD5-iVWC--y-3HmGZyg/pub)
- [Part 4: Cyber Observable Objects](https://docs.google.com/document/d/167aIyr5BIAJJORzjT11U25cGSBJ0cBNSdkheNJFz6l8/pub)
- [Part 5: STIX Patterning](https://docs.google.com/document/d/1nK1RXcE2aMvQoG1Kgr3aTBtHZ1IyehzOk7vU0n5FUGY/pub) -
@@ -36,33 +28,11 @@ layout: default
STIX is designed to improve many different capabilities, such as collaborative threat analysis, automated threat exchange, automated detection and response, and more.
--
Sample:
-{% highlight json%} -{ - "type": "campaign", - "id": "campaign--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f", - "created": "2016-04-06T20:03:00.000Z", - "name": "Green Group Attacks Against Finance", - "description": "Campaign by Green Group against targets in the financial services sector." -} -{% endhighlight %} -Links:
--
-
- [STIX Review](stix/review) -
- [About STIX 2.0](stix/about) -
- [Comparing STIX 1 and STIX 2](stix/compare) -
- [Resources](stix/resources) -
- [Examples and Tutorials](stix/examples) -
- [Sample Walkthrough](stix/walkthrough) -
- [Archive of STIX 1.x](https://stixproject.github.io/) -