Blog
The DOGESEC blog
-
A Graph of Credit Card Fraud using STIX
PRODUCTS July 29, 2024
Using STIX 2.1 to track fraudulent credit card transactions so that they can be traversed on a graph. -
Mapping CVEs to MITRE ATT&CK
Being able to label CVEs with ATT&CK data allows for rich filtering, e.g. what CVEs use ATT&CK Technique X?. Here's how to create those labels in STIX 2.1. -
Graphing of Ransomware Payments
POC July 23, 2024
Modelling ransomwhe.re data as STIX 2.1 object so that it can be explored as a graph. -
The Problems with Modelling Countries as STIX Objects
PRODUCTS July 17, 2024
And why we built a small utility to solve them for you. -
Extending MITRE ATT&CK
Add new objects, edit existing ones or create an entierly new framework. Anything is possible. -
Getting Started with MITRE ATT&CK Navigator
TUTORIAL PRODUCTS July 11, 2024
The MITRE ATT&CK Navigator is a very useful tool to explore the MITRE ATT&CK framework. Here is how I've used it. -
Getting Started with MITRE TRAM
TUTORIAL PRODUCTS July 08, 2024
MITRE TRAM automatically extracts ATT&CK Techniques being discussed in reports. -
MITRE ATT&CK is More Than Tactics and Techniques
TUTORIAL PRODUCTS July 04, 2024
Software, Data Sources, Data Components, Campaigns etc., make the MITRE ATT&CK data set even more powerful than you might realise. -
A Beginners Guide to TAXII Clients and Servers
Want to consume and/or share cyber threat intelligence easily? TAXII is what you need. Let me show you. -
An Introduction to Writing Sigma Rules
TUTORIAL PRODUCTS June 27, 2024
Sigma Rules are becoming more widely adopted. You should probably learn how to write them. Let me show you.
1 of 2
Older posts →