Structured Threat Intelligence Graph (STIG) is a tool for creating, editing, querying, analyzing and visualizing threat intelligence. It uses STIX version 2 as its data format. STIG uses a graph database (Neo4j) to store the data.
See the STIG Innovation Sheet for an overview.
For installation and usage instructions, see our documentation.
The STIX version 2.1 specification can be found at https://oasis-open.github.io/cti-documentation/resources. An introduction and walk through of STIX can be found at https://oasis-open.github.io/cti-documentation/stix/intro.html, and https://oasis-open.github.io/cti-documentation/stix/walkthrough.html.