llms.txt Content
# OPTIX
> OPTIX (Operational Platform for Threat Intelligence eXploration) is a community-driven threat intelligence platform that aggregates open-source threat intelligence (OSINT), extracts structured cyber threat intelligence (CTI) — threat actors, malware families, CVEs, IOCs, and MITRE ATT&CK techniques — correlates entities across reports, and generates SIEM detection rules in 11+ formats including Sigma, Splunk SPL, Microsoft KQL, Elastic EQL, CrowdStrike LogScale, and YARA.
OPTIX is built for SOC analysts, CTI teams, incident responders, and detection engineers — particularly small teams and organisations that don't have a dedicated CTI capability but still need enterprise-grade coverage of the threat landscape.
## Core capabilities
- Automated CTI collection from RSS, OSINT, vendor advisories, threat blogs, AlienVault OTX, URLhaus, NVD, Reddit, and Discord.
- Multi-stage extraction: deterministic pattern matching, fuzzy entity resolution, LLM semantic scoring.
- Correlation engine linking threat actors, malware, CVEs, IOCs, TTPs, and MITRE ATT&CK techniques across the knowledge base.
- Detection rule generation: Sigma, Splunk SPL, Microsoft KQL, Elastic EQL/ES|QL, CrowdStrike LogScale, QRadar AQL, Chronicle UDM, SentinelOne S1QL, Palo Alto XQL, Suricata, YARA.
- Intelligence reports with full source attribution, exportable to PDF and Word.
- STIX 2.1 / TAXII 2.1 producer and consumer for SOAR and TIP interoperability.
- MITRE ATT&CK coverage heatmap.
- Multi-tenant workspaces with role-based access control.
## Key concepts and entities
Cyber Threat Intelligence (CTI), Threat Intelligence Platform (TIP), MITRE ATT&CK, Tactics Techniques and Procedures (TTPs), Indicators of Compromise (IOCs), APT groups, malware families, vulnerabilities (CVE), Sigma rules, KQL, SPL, EQL, YARA, Suricata, Threat Hunting, Detection Engineering, SIEM, SOAR, Incident Response (IR), Open Source Intelligence (OSINT), AlienVault OTX, URLhaus, NVD, Microsoft Sentinel, Splun