1. Introduction
Cyberthreat information (CT) is shared to assist organizations in identifying, assessing, monitoring, and responding to cyberthreats [1]. The collecting and analysis of attack patterns, IDs, malware, attackers, and tactic-technique-procedures are all part of CTI sharing (TTP). The most widely used CTIdata expression language is STIX [2], [3], and the data communication protocol for exchanging data expressed as STIX is TAXII. The STIX language is used to express the analyzed CTI data, which is subsequently exchanged using the TAXII protocol [4]. To proactively minimize cyber dangers, data must be shared quickly and efficiently.