1 Scope
2 References
3 Definitions
3.1 Terms defined elsewhere
3.2 Terms defined in this Recommendation
4 Abbreviations and acronyms
5 Conventions
6 Overview of STIX
6.1 Concepts of STIX
6.2 Objects in STIX
6.3 STIX characteristics and tools
7 Use cases for STIX 2.0
7.1 Ransomware use case with STIX 2.0
7.2 Use case for cyberattack on a cryptocurrency exchange
Annex A – Ransomware use case with STIX 1.2
A.1 Analysing cyber threats
A.2 Specifying indicator patterns for cyber threats
A.3 Managing response activities
Bibliography