https://de.ketiadaan.com/post/which-application-protocol-is-used-to-exchange-cyber-threat-intelligence-over-http
Which application protocol is used to exchange cyber threat intelligence over http?