From 97ffb35997ced311e70e60debc739c0f35f6eb32 Mon Sep 17 00:00:00 2001 From: Herman Slatman Date: Sun, 8 Jan 2017 11:52:05 +0100 Subject: [PATCH 1/3] Add APT & Cyber Criminal Campaign Collection --- README.md | 8 ++++++++ 1 file changed, 8 insertions(+) diff --git a/README.md b/README.md index c229951..3fd6c5b 100644 --- a/README.md +++ b/README.md @@ -988,6 +988,14 @@ All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly All kinds of reading material about Threat Intelligence. Includes (scientific) research and whitepapers. + + + +
+ APT & CyberCriminal Campaign Collection + + Extensive collection of (historic) campaigns. Entries come from various sources. +
APTnotes From 7c628f9867a9df768121071f7249d96e03af2642 Mon Sep 17 00:00:00 2001 From: Herman Slatman Date: Sun, 8 Jan 2017 11:56:52 +0100 Subject: [PATCH 2/3] Fix small typo --- README.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/README.md b/README.md index 3fd6c5b..852c549 100644 --- a/README.md +++ b/README.md @@ -990,7 +990,7 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r
- APT & CyberCriminal Campaign Collection + APT & Cyber Criminal Campaign Collection Extensive collection of (historic) campaigns. Entries come from various sources. From 100ee2ac377c81f27baefdc8e193762c2ba1fe89 Mon Sep 17 00:00:00 2001 From: Herman Slatman Date: Sun, 8 Jan 2017 12:05:12 +0100 Subject: [PATCH 3/3] Fix Travis build by updating links --- .travis.yml | 2 +- README.md | 4 ++-- 2 files changed, 3 insertions(+), 3 deletions(-) diff --git a/.travis.yml b/.travis.yml index 2c89017..9c2ba1d 100644 --- a/.travis.yml +++ b/.travis.yml @@ -4,4 +4,4 @@ rvm: before_script: - gem install awesome_bot script: - - awesome_bot README.md --white-list CONTRIBUTING.md,https://www.threatcrowd.org/,https://intel.deepviz.com/recap_network.php,https://www.fireeye.com/services/freeware/ioc-editor.html,https://www.threatconnect.com/wp-content/uploads/ThreatConnect-The-Diamond-Model-of-Intrusion-Analysis.pdf,http://www.dtic.mil/dtic/tr/fulltext/u2/a547092.pdf,http://www.dtic.mil/doctrine/new_pubs/jp2_0.pdf,http://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511,https://sslbl.abuse.ch/,https://soltra.com/,https://cryptome.org/2015/09/cti-guide.pdf,https://intel.criticalstack.com/,https://car.mitre.org/wiki/Main_Page,http://dx.doi.org/10.6028/NIST.SP.800-150,https://bitbucket.org/camp0/aiengine \ No newline at end of file + - awesome_bot README.md --white-list CONTRIBUTING.md,https://www.threatcrowd.org/,https://intel.deepviz.com/recap_network.php,https://www.fireeye.com/services/freeware/ioc-editor.html,https://www.threatconnect.com/wp-content/uploads/ThreatConnect-The-Diamond-Model-of-Intrusion-Analysis.pdf,http://www.dtic.mil/dtic/tr/fulltext/u2/a547092.pdf,http://www.dtic.mil/doctrine/new_pubs/jp2_0.pdf,http://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511,https://sslbl.abuse.ch/,https://soltra.com/,https://cryptome.org/2015/09/cti-guide.pdf,https://intel.criticalstack.com/,https://car.mitre.org/wiki/Main_Page,http://dx.doi.org/10.6028/NIST.SP.800-150,https://bitbucket.org/camp0/aiengine,https://www.abuse.ch/ \ No newline at end of file diff --git a/README.md b/README.md index 852c549..09142fb 100644 --- a/README.md +++ b/README.md @@ -37,7 +37,7 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
- BGP Ranking + BGP Ranking Ranking of ASNs having the most malicious content. @@ -1138,7 +1138,7 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r
- Threat Intelligence: Collecting, Analysing, Evaluating + Threat Intelligence: Collecting, Analysing, Evaluating This report by MWR InfoSecurity clearly describes several diffent types of threat intelligence, including strategic, tactical and operational variations. It also discusses the processes of requirements elicitation, collection, analysis, production and evaluation of threat intelligence. Also included are some quick wins and a maturity model for each of the types of threat intelligence defined by MWR InfoSecurity.