Table of Contents

 1     Scope          
 2     References
 3     Definitions 
        3.1     Terms defined elsewhere          
        3.2     Terms defined in this Recommendation              
 4     Abbreviations and acronyms
 5     Conventions             
 6     Overview of STIX     
        6.1     Concepts of STIX          
        6.2     Objects in STIX              
        6.3     STIX characteristics and tools  
 7     Use cases for STIX 2.0           
        7.1     Ransomware use case with STIX 2.0     
        7.2     Use case for cyberattack on a cryptocurrency exchange              
Annex A – Ransomware use case with STIX 1.2    
        A.1     Analysing cyber threats             
        A.2     Specifying indicator patterns for cyber threats  
        A.3     Managing response activities  
Bibliography