From 169ba8d1aebe46dad63b4782d20d7f51278236c8 Mon Sep 17 00:00:00 2001 From: Jesse Date: Wed, 2 Aug 2017 16:32:03 -0400 Subject: [PATCH] Added flavico --- _layouts/default.html | 5 ++-- _layouts/page.html | 2 ++ _layouts/post.html | 2 ++ index.md | 53 +++++++------------------------------------ 4 files changed, 14 insertions(+), 48 deletions(-) diff --git a/_layouts/default.html b/_layouts/default.html index a232664..cf57d70 100644 --- a/_layouts/default.html +++ b/_layouts/default.html @@ -1,5 +1,7 @@ + + {% include head.html %} @@ -9,9 +11,6 @@
- {{ content }}
diff --git a/_layouts/page.html b/_layouts/page.html index 4f08684..5027650 100644 --- a/_layouts/page.html +++ b/_layouts/page.html @@ -1,6 +1,8 @@ --- layout: default --- + +
diff --git a/_layouts/post.html b/_layouts/post.html index 3a0fb52..358c10d 100644 --- a/_layouts/post.html +++ b/_layouts/post.html @@ -1,6 +1,8 @@ --- layout: default --- + +
diff --git a/index.md b/index.md index fd534e7..328c011 100644 --- a/index.md +++ b/index.md @@ -14,17 +14,9 @@ layout: default
![STIX Logo]({{ site.baseurl }}/img/stix.png){: .panel-logo}
A structured language for cyber threat intelligence
- - Read the Latest Specification! + + Read the Latest Specification -
Or check out each individual part here:
-
- [Part 1: STIX Core Concepts](https://docs.google.com/document/d/1dIrh1Lp3KAjEMm8o2VzAmuV0Peu-jt9aAh1IHrjAroM/pub)
- [Part 2: STIX Objects](https://docs.google.com/document/d/1IvkLxg_tCnICsatu2lyxKmWmh1gY2h8HUNssKIE-UIA/pub)
- [Part 3: Cyber Observable Core Concepts](https://docs.google.com/document/d/1ti4Ei_ii_Uc4izHNZlYmBP9NgD5-iVWC--y-3HmGZyg/pub)
- [Part 4: Cyber Observable Objects](https://docs.google.com/document/d/167aIyr5BIAJJORzjT11U25cGSBJ0cBNSdkheNJFz6l8/pub)
- [Part 5: STIX Patterning](https://docs.google.com/document/d/1nK1RXcE2aMvQoG1Kgr3aTBtHZ1IyehzOk7vU0n5FUGY/pub) -

@@ -36,33 +28,11 @@ layout: default

STIX is designed to improve many different capabilities, such as collaborative threat analysis, automated threat exchange, automated detection and response, and more.

-

-

- ![STIX 2.0 Diagram 2]({{ site.baseurl }}/img/STIXdiagram2.PNG){: .figure-img .img-fluid} - **STIX Relationship Diagram with Sighting** -
-

-

Sample:

-{% highlight json%} -{ - "type": "campaign", - "id": "campaign--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f", - "created": "2016-04-06T20:03:00.000Z", - "name": "Green Group Attacks Against Finance", - "description": "Campaign by Green Group against targets in the financial services sector." -} -{% endhighlight %} -

Links:

-
    -
  • [STIX Review](stix/review)
  • -
  • [About STIX 2.0](stix/about)
  • -
  • [Comparing STIX 1 and STIX 2](stix/compare)
  • -
  • [Resources](stix/resources)
  • -
  • [Examples and Tutorials](stix/examples)
  • -
  • [Sample Walkthrough](stix/walkthrough)
  • -
  • [Archive of STIX 1.x](https://stixproject.github.io/)
  • -
+
+ ![STIX 2.0 Relationship Example]({{ site.baseurl }}/img/stix2_relationship_example_2.png){: .figure-img .img-fluid} + **STIX 2.0 Relationship Example** +
@@ -72,8 +42,8 @@ layout: default
![TAXII Logo]({{ site.baseurl }}/img/taxii.png){: .panel-logo}
A transport mechanism for sharing cyber threat intelligence
- - Read the Latest Specification! (Draft 2) + + Read the Latest Specification (Draft 2)
@@ -92,14 +62,7 @@ layout: default **TAXII Collections and Channels**

-

-

Links:

-
    -
  • [Archive of TAXII 1.x](https://taxiiproject.github.io/)
  • -
-

-