Merge pull request #63 from hslatman/hs_december_2016

Add APT & Cyber Criminal Campaign Collection
This commit is contained in:
Herman Slatman 2017-01-08 12:09:17 +01:00 committed by GitHub
commit e06e10611a
2 changed files with 11 additions and 3 deletions

View File

@ -4,4 +4,4 @@ rvm:
before_script: before_script:
- gem install awesome_bot - gem install awesome_bot
script: script:
- awesome_bot README.md --white-list CONTRIBUTING.md,https://www.threatcrowd.org/,https://intel.deepviz.com/recap_network.php,https://www.fireeye.com/services/freeware/ioc-editor.html,https://www.threatconnect.com/wp-content/uploads/ThreatConnect-The-Diamond-Model-of-Intrusion-Analysis.pdf,http://www.dtic.mil/dtic/tr/fulltext/u2/a547092.pdf,http://www.dtic.mil/doctrine/new_pubs/jp2_0.pdf,http://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511,https://sslbl.abuse.ch/,https://soltra.com/,https://cryptome.org/2015/09/cti-guide.pdf,https://intel.criticalstack.com/,https://car.mitre.org/wiki/Main_Page,http://dx.doi.org/10.6028/NIST.SP.800-150,https://bitbucket.org/camp0/aiengine - awesome_bot README.md --white-list CONTRIBUTING.md,https://www.threatcrowd.org/,https://intel.deepviz.com/recap_network.php,https://www.fireeye.com/services/freeware/ioc-editor.html,https://www.threatconnect.com/wp-content/uploads/ThreatConnect-The-Diamond-Model-of-Intrusion-Analysis.pdf,http://www.dtic.mil/dtic/tr/fulltext/u2/a547092.pdf,http://www.dtic.mil/doctrine/new_pubs/jp2_0.pdf,http://www.amazon.com/Structured-Analytic-Techniques-Intelligence-Analysis/dp/1452241511,https://sslbl.abuse.ch/,https://soltra.com/,https://cryptome.org/2015/09/cti-guide.pdf,https://intel.criticalstack.com/,https://car.mitre.org/wiki/Main_Page,http://dx.doi.org/10.6028/NIST.SP.800-150,https://bitbucket.org/camp0/aiengine,https://www.abuse.ch/

View File

@ -37,7 +37,7 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea
</tr> </tr>
<tr> <tr>
<td> <td>
<a href="http://bgpranking.circl.lu/" target="_blank">BGP Ranking</a> <a href="https://www.circl.lu/projects/bgpranking/" target="_blank">BGP Ranking</a>
</td> </td>
<td> <td>
Ranking of ASNs having the most malicious content. Ranking of ASNs having the most malicious content.
@ -988,6 +988,14 @@ All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly
All kinds of reading material about Threat Intelligence. Includes (scientific) research and whitepapers. All kinds of reading material about Threat Intelligence. Includes (scientific) research and whitepapers.
<table> <table>
<tr>
<td>
<a href="https://github.com/gasgas4/APT_CyberCriminal_Campaign" target="_blank">APT & Cyber Criminal Campaign Collection</a>
</td>
<td>
Extensive collection of (historic) campaigns. Entries come from various sources.
</td>
</tr>
<tr> <tr>
<td> <td>
<a href="https://github.com/kbandla/APTnotes" target="_blank">APTnotes</a> <a href="https://github.com/kbandla/APTnotes" target="_blank">APTnotes</a>
@ -1130,7 +1138,7 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r
</tr> </tr>
<tr> <tr>
<td> <td>
<a href="https://www.cpni.gov.uk/Documents/Publications/2015/23-March-2015-MWR_Threat_Intelligence_whitepaper-2015.pdf" target="_blank">Threat Intelligence: Collecting, Analysing, Evaluating</a> <a href="https://www.ncsc.gov.uk/content/files/protected_files/guidance_files/MWR_Threat_Intelligence_whitepaper-2015.pdf" target="_blank">Threat Intelligence: Collecting, Analysing, Evaluating</a>
</td> </td>
<td> <td>
This report by MWR InfoSecurity clearly describes several diffent types of threat intelligence, including strategic, tactical and operational variations. It also discusses the processes of requirements elicitation, collection, analysis, production and evaluation of threat intelligence. Also included are some quick wins and a maturity model for each of the types of threat intelligence defined by MWR InfoSecurity. This report by MWR InfoSecurity clearly describes several diffent types of threat intelligence, including strategic, tactical and operational variations. It also discusses the processes of requirements elicitation, collection, analysis, production and evaluation of threat intelligence. Also included are some quick wins and a maturity model for each of the types of threat intelligence defined by MWR InfoSecurity.