2019-02-21 21:55:51 +01:00
# intelligence-icons
**intelligence-icons** is a collection of icons and diagrams for building training and marketing materials around Intelligence sharing; including but not limited to CTI, MISP Threat Sharing, STIX 2.
2019-02-21 22:09:49 +01:00
This is work in progress.
2019-02-21 21:55:51 +01:00
## Format and folders
* **`ai`**: Source files in Adobe Illustrator format.
* **`tools`**: scripts for automated exports and such
* **`square_png/xx/**`: PNG export with square around the icon in `xx` by `xx` pixels
* **`simple_png/xx/`** PNG export of the simple icon in `xx` by `xx` pixels
* **`svg`**: planned for future releases
## License
2019-02-21 22:16:40 +01:00
This work is licensed under the [Creative Commons Attribution-ShareAlike 4.0 International License ](http://creativecommons.org/licenses/by-sa/4.0/ ).
2019-02-21 21:55:51 +01:00
- Copyright 2016 Bret Jordan - original works with some potential licensed material
- Copyright 2018 Françoise Penninckx - redesign from scratch
Note: Following some legal uncertainty around some components in the original STIX 2 icon-set provided by Bret Jordan the icons were fully redesigned from scratch by Françoise Penninckx. This makes this collection fully compliant with the above license and copyright owners.
2019-02-21 22:09:49 +01:00
Over time the icon set was expanded with additional icons.
2019-02-21 22:16:40 +01:00
The font is [Roboto ](https://fonts.google.com/specimen/Roboto ) licensed under the [Apache License, Version 2.0 ](http://www.apache.org/licenses/LICENSE-2.0 ).
2019-02-21 22:09:49 +01:00
## Examples
### Square
    
    
   
## Simple
    
    
   