## SCW Atom Feed — Integration Schema
This document describes the structure and semantics of the **Shimi's Cyber World** Atom feed, designed for partners, aggregators, and platforms (e.g. Feedly, Inoreader, SIEMs) that want to consume or map SCW content.
---
### Feed Endpoint
| Property | Value |
|----------|-------|
| **URL** | `https://shimiscyberworld.com/feed.xml` |
| **Format** | Atom 1.0 (RFC 4287) |
| **Encoding** | UTF-8 |
| **Max entries** | 200 (most recent) |
| **Update frequency** | Every 15 minutes (automated feed engine) |
| **TLS** | Required (HTTPS only) |
---
### Namespaces
```xml
```
| Prefix | URI | Purpose |
|--------|-----|---------|
| *(default)* | `http://www.w3.org/2005/Atom` | Standard Atom elements |
| `media` | `http://search.yahoo.com/mrss/` | Thumbnails and media content |
| `scw` | `https://shimiscyberworld.com/ns/1.0` | SCW custom threat-intel fields |
---
### Feed-Level Elements
```xml
Shimi's Cyber World
A cyber ecosystem built around a strong community...
https://shimiscyberworld.com/feed.xml
2026-04-14T12:00:00+03:00
SCW Feed Engine
```
---
### Entry Structure
Every `` follows this structure. Fields marked **★** are always present; fields marked **◆** are conditional.
#### Standard Atom Fields
| Element | Presence | Type | Description |
|---------|----------|------|-------------|
| `` | ★ | string | Post headline (max ~100 chars, AI-rewritten) |
| `` | ★ | URL | Permalink to post on shimiscyberworld.com |
| `` | ★ | ISO 8601 | Original publication timestamp |
| `` | ★ | ISO 8601 | Last update timestamp |
| `` | ★ | URL | Unique identifier (same as permalink) |
| `` | ★ | HTML (CDATA) | Full post body in HTML |
| `` | ★ | string | Always "Shimi's Cyber World" |
| `` | ★ | HTML (CDATA) | Excerpt, max 180 chars |
| `` | ★ | string | One per tag — see [Tag Vocabulary](#tag-vocabulary) |
#### Media Elements (MRSS)
| Element | Presence | Type | Description |
|---------|----------|------|-------------|
| `` | ◆ | URL | Post thumbnail image |
| `` | ◆ | URL | Full-size post image |
#### SCW Custom Elements (`scw:` namespace)
| Element | Presence | Type | Values | Description |
|---------|----------|------|--------|-------------|
| `` | ◆ | enum | `LOW`, `MEDIUM`, `HIGH` | Threat relevance score |
| `` | ◆ | enum | See [Event Types](#event-types) | Classification of the security event |
| `` | ◆ | enum | `TLP:CLEAR`, `TLP:AMBER` | Traffic Light Protocol marking |
| `` | ◆ | string | e.g. "Cyber Threat Intelligence" | Original intelligence source |
| `` | ◆ | URL | e.g. `https://thehackernews.com/...` | Link to original article |
| `` | ◆ | URL | e.g. `https://t.me/c/...` | Original Telegram message (legacy posts) |
| `` | ◆ | element | — | Org mentioned in the post (repeatable) |
| `` | ◆ | string | e.g. "APT28" | Named threat group (repeatable) |
| `` | ◆ | string | ISO 3166-1 alpha-2 | Targeted country code (repeatable) |
| `` | ◆ | element | — | Indicator of Compromise (repeatable) |
| `` | ◆ | element | — | MITRE ATT&CK technique (repeatable) |
---
### Element Details
#### ``
Represents a company, agency, or entity mentioned in the post.
```xml
```
| Attribute | Required | Values |
|-----------|----------|--------|
| `name` | ★ | Organization name |
| `domain` | ◆ | Primary domain (e.g. `ibm.com`) |
| `role` | ◆ | `victim`, `vendor`, `threat-actor` |
#### ``
An Indicator of Compromise extracted from the post.
```xml
```
| Attribute | Required | Values |
|-----------|----------|--------|
| `id` | ★ | CVE ID or advisory identifier |
| `type` | ★ | Vulnerability type — see [IOC Types](#ioc-types) |
| `indicator` | ◆ | Human-readable description of the indicator |
#### ``
MITRE ATT&CK technique mapping for the post.
```xml
```
| Attribute | Required | Values |
|-----------|----------|--------|
| `id` | ★ | Technique ID (e.g. `T1190`, `T1059.001`) |
| `name` | ★ | Technique name per ATT&CK |
| `tactic` | ★ | ATT&CK tactic phase |
---
### Enumerations
#### Event Types
| Value | Description |
|-------|-------------|
| `data-breach` | Data exposure or leak incident |
| `ransomware` | Ransomware attack or campaign |
| `vulnerability` | Software vulnerability disclosure |
| `espionage` | Nation-state or corporate espionage |
| `fraud` | Phishing, BEC, or financial fraud |
| `supply-chain` | Supply chain compromise |
| `defacement` | Website or service defacement |
| `advisory` | Security advisory or policy update |
| `tool-release` | New security tool or framework |
| `research` | Threat research or analysis |
| `other` | Uncategorized |
#### IOC Types
| Value | Description |
|-------|-------------|
| `RCE` | Remote Code Execution |
| `XSS` | Cross-Site Scripting |
| `SQLi` | SQL Injection |
| `SSRF` | Server-Side Request Forgery |
| `CSRF` | Cross-Site Request Forgery |
| `Auth Bypass` | Authentication Bypass |
| `Privilege Escalation` | Privilege Escalation |
| `Path Traversal` | Directory/Path Traversal |
| `Buffer Overflow` | Memory Corruption / Buffer Overflow |
| `Information Disclosure` | Sensitive Data Exposure |
| `DoS` | Denial of Service |
| `DDoS` | Distributed Denial of Service |
| `DLL Sideloading` | DLL Side-Loading Attack |
| `DLL Hijacking` | DLL Hijacking |
| `IDOR` | Insecure Direct Object Reference |
| `Data Breach` | Data Breach / Data Exposure |
| `Unrestricted File Upload` | File Upload Vulnerability |
| `Code Injection` | Generic Code Injection |
#### Tag Vocabulary
Tags appear as ``. Common values:
| Tag | Meaning |
|-----|---------|
| `vulnerability` | CVE or vulnerability advisory |
| `threat-intel` | Threat intelligence report |
| `data-breach` | Data breach incident |
| `ransomware` | Ransomware-related |
| `phishing` | Phishing campaigns |
| `malware` | Malware analysis |
| `apt` | Advanced Persistent Threat |
| `cisa-kev` | CISA Known Exploited Vulnerability |
| `supply-chain` | Supply chain risk |
| `iot` | Internet of Things |
| `cloud` | Cloud security |
| `zero-day` | Zero-day exploit |
| *organization name* | Slugified org name (e.g. `microsoft`, `ibm`, `fbi`) |
Tags are **not** a closed set — new tags are added automatically as new topics emerge.
---
### Score Mapping for Consumers
If you're building filters, rules, or alerts:
| SCW Score | CVSS Range | Recommended Action |
|-----------|------------|-------------------|
| `HIGH` | 7.0 – 10.0 | Alert / immediate triage |
| `MEDIUM` | 4.0 – 6.9 | Monitor / queue for review |
| `LOW` | 0.0 – 3.9 | Informational awareness |
Vulnerability posts with `cvss_score` in frontmatter include the exact numeric CVSS value in the HTML body. The `` Atom element reflects the tier above.
---
### Post Source Types
Posts originate from multiple intelligence pipelines:
| Source | `` examples | Content profile |
|--------|------------------------------|-----------------|
| **Telegram channels** | "Cyber Threat Intelligence", "Cyber War Zone" | Breaking news, threat alerts |
| **RSS feeds** | "The Hacker News", "BleepingComputer" | Vulnerability advisories, analysis |
| **NVD** | "National Vulnerability Database" | CVE details, CVSS scores |
| **CISA KEV** | "CISA KEV" | Known exploited vulnerabilities |
---
### Sample Entry (Full)
```xml
Critical RCE in Apache Struts CVE-2026-50001
2026-04-14T10:30:00+03:00
2026-04-14T10:30:00+03:00
https://shimiscyberworld.com/posts/critical-rce-in-apache-struts/
<![CDATA[
Shimi's Cyber World
<![CDATA[Apache Struts critical RCE allows unauthenticated...]]>
HIGH
vulnerability
TLP:CLEAR
The Hacker News
https://thehackernews.com/2026/04/apache-struts.html
UNC4990
US
```
---
### Integration Quick-Start
**1. Basic RSS consumption** — subscribe to `https://shimiscyberworld.com/feed.xml` in any Atom/RSS reader.
**2. Filter by tags** — use `` to route posts. Example: filter `vulnerability` + `HIGH` score for critical vuln alerts.
**3. Map to your taxonomy** — use `` to map into your incident classification. Use `` for ATT&CK alignment.
**4. Enrich your platform** — extract ``, ``, and `` for automated enrichment of your SIEM/SOAR/TIP.
**5. Rate limiting** — no rate limits, but please poll no more than once per 5 minutes.
---
### Contact
For integration questions: [admin@shimiscyberworld.com](mailto:admin@shimiscyberworld.com)
</div>
Apache has released...
]]>