├── Archive ├── CERTBI - CTI service architecture.pdf ├── CREST CTI Maturity Model Tool │ ├── CREST_CTI_MMAT-Detailed-level_Dec2019_Final_V1.2.xlsx │ ├── CREST_CTI_MMAT-Intermediate-level-1.6.xlsx │ └── CREST_CTI_MMAT-Summary-Level_v1.0.xlsx ├── Cyber Threat Intelligence A Product Without a Process.pdf ├── Cyber_Threat_Profiling_Ebook.pdf ├── Diamond Model - Whitepaper.pdf ├── Dragos - CMF_For_ICS.pdf ├── Lockheed Martin - Intel-Driven-Defense with Courses of Action Matrix.pdf ├── Mandiant - cti-analyst-core-competencies-framework-v1.pdf ├── NCSC - Cyber-Threat-Intelligence-A-Guide-For-Decision-Makers-and-Analysts-v2.0.pdf ├── Recorded Future - Practical Enterprise Playbooks.pdf ├── Recorded Future - intelligence-handbook-fourth-edition.pdf ├── Recorded Future - security-intelligence-handbook-third-edition.pdf ├── Recorded Future - security-intelligence-program.pdf ├── SANS - ICS Kill Chain - Whitepaper.pdf ├── Team Cymru - NetFlow IR Analysis - Analysis of a Management IP Address linked to Molerats APT.pdf ├── Team Cymru - NetFlow IR Analysis - Quick Wins with Network Flow Analysis.pdf ├── ThreatConnect - Maturity-Model-Whitepaper-2017-1.pdf ├── documents_public_Analysts_Style_Manual.pdf └── the-dark-visitor-inside-the-world-of-chinese-hackers.pdf ├── README.md └── ci-logo.png /Archive/CERTBI - CTI service architecture.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/CERTBI - CTI service architecture.pdf -------------------------------------------------------------------------------- /Archive/CREST CTI Maturity Model Tool/CREST_CTI_MMAT-Detailed-level_Dec2019_Final_V1.2.xlsx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/CREST CTI Maturity Model Tool/CREST_CTI_MMAT-Detailed-level_Dec2019_Final_V1.2.xlsx -------------------------------------------------------------------------------- /Archive/CREST CTI Maturity Model Tool/CREST_CTI_MMAT-Intermediate-level-1.6.xlsx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/CREST CTI Maturity Model Tool/CREST_CTI_MMAT-Intermediate-level-1.6.xlsx -------------------------------------------------------------------------------- /Archive/CREST CTI Maturity Model Tool/CREST_CTI_MMAT-Summary-Level_v1.0.xlsx: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/CREST CTI Maturity Model Tool/CREST_CTI_MMAT-Summary-Level_v1.0.xlsx -------------------------------------------------------------------------------- /Archive/Cyber Threat Intelligence A Product Without a Process.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/Cyber Threat Intelligence A Product Without a Process.pdf -------------------------------------------------------------------------------- /Archive/Cyber_Threat_Profiling_Ebook.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/Cyber_Threat_Profiling_Ebook.pdf -------------------------------------------------------------------------------- /Archive/Diamond Model - Whitepaper.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/Diamond Model - Whitepaper.pdf -------------------------------------------------------------------------------- /Archive/Dragos - CMF_For_ICS.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/Dragos - CMF_For_ICS.pdf -------------------------------------------------------------------------------- /Archive/Lockheed Martin - Intel-Driven-Defense with Courses of Action Matrix.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/Lockheed Martin - Intel-Driven-Defense with Courses of Action Matrix.pdf -------------------------------------------------------------------------------- /Archive/Mandiant - cti-analyst-core-competencies-framework-v1.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/Mandiant - cti-analyst-core-competencies-framework-v1.pdf -------------------------------------------------------------------------------- /Archive/NCSC - Cyber-Threat-Intelligence-A-Guide-For-Decision-Makers-and-Analysts-v2.0.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/NCSC - Cyber-Threat-Intelligence-A-Guide-For-Decision-Makers-and-Analysts-v2.0.pdf -------------------------------------------------------------------------------- /Archive/Recorded Future - Practical Enterprise Playbooks.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/Recorded Future - Practical Enterprise Playbooks.pdf -------------------------------------------------------------------------------- /Archive/Recorded Future - intelligence-handbook-fourth-edition.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/Recorded Future - intelligence-handbook-fourth-edition.pdf -------------------------------------------------------------------------------- /Archive/Recorded Future - security-intelligence-handbook-third-edition.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/Recorded Future - security-intelligence-handbook-third-edition.pdf -------------------------------------------------------------------------------- /Archive/Recorded Future - security-intelligence-program.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/Recorded Future - security-intelligence-program.pdf -------------------------------------------------------------------------------- /Archive/SANS - ICS Kill Chain - Whitepaper.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/SANS - ICS Kill Chain - Whitepaper.pdf -------------------------------------------------------------------------------- /Archive/Team Cymru - NetFlow IR Analysis - Analysis of a Management IP Address linked to Molerats APT.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/Team Cymru - NetFlow IR Analysis - Analysis of a Management IP Address linked to Molerats APT.pdf -------------------------------------------------------------------------------- /Archive/Team Cymru - NetFlow IR Analysis - Quick Wins with Network Flow Analysis.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/Team Cymru - NetFlow IR Analysis - Quick Wins with Network Flow Analysis.pdf -------------------------------------------------------------------------------- /Archive/ThreatConnect - Maturity-Model-Whitepaper-2017-1.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/ThreatConnect - Maturity-Model-Whitepaper-2017-1.pdf -------------------------------------------------------------------------------- /Archive/documents_public_Analysts_Style_Manual.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/documents_public_Analysts_Style_Manual.pdf -------------------------------------------------------------------------------- /Archive/the-dark-visitor-inside-the-world-of-chinese-hackers.pdf: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/Archive/the-dark-visitor-inside-the-world-of-chinese-hackers.pdf -------------------------------------------------------------------------------- /README.md: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/README.md -------------------------------------------------------------------------------- /ci-logo.png: -------------------------------------------------------------------------------- https://raw.githubusercontent.com/curated-intel/CTI-fundamentals/HEAD/ci-logo.png --------------------------------------------------------------------------------