From f79edc8c1b388f4a2bc2895eb97ac2da02c01778 Mon Sep 17 00:00:00 2001 From: Alexandre Dulaunoy Date: Sun, 18 Dec 2016 13:03:42 +0100 Subject: [PATCH] TTI added --- README.md | 5 +++++ 1 file changed, 5 insertions(+) diff --git a/README.md b/README.md index 9103fe8..543a015 100644 --- a/README.md +++ b/README.md @@ -35,6 +35,7 @@ The following taxonomies are described: - [OSINT Open Source Intelligence - Classification](./osint) - [Stealth Malware Taxonomy as defined by Joanna Rutkowska](./stealth-malware) - [The Permissible Actions Protocol - or short: PAP - was designed to indicate how the received information can be used.](./PAP) +- [Targeted Threat Index is a metric for assigning an overall threat ranking score to email messages that deliver malware to a victim’s computer.](./targeted-threat-index) - [TLP - Traffic Light Protocol](./tlp) - Vocabulary for Event Recording and Incident Sharing [VERIS](./veris) @@ -123,6 +124,10 @@ Marking of Classified and Unclassified materials as described by the North Atlan Open Threat Taxonomy v1.1 base on James Tarala of SANS [ref](http://www.auditscripts.com/resources/open_threat_taxonomy_v1.1a.pdf). +### [Targeted Threat Index is a metric for assigning an overall threat ranking score to email messages that deliver malware to a victim’s computer.](./targeted-threat-index) + +The Targeted Threat Index is a metric for assigning an overall threat ranking score to email messages that deliver malware to a victim’s computer. The TTI metric was first introduced at SecTor 2013 by Seth Hardy as part of the talk “RATastrophe: Monitoring a Malware Menagerie” along with Katie Kleemola and Greg Wiseman. [More info about TTI[(https://citizenlab.org/2013/10/targeted-threat-index/). + ### [The Permissible Actions Protocol - or short: PAP - was designed to indicate how the received information can be used.](./PAP) The Permissible Actions Protocol - or short: PAP - was designed to indicate how the received information can be used. It's a protocol/taxonomy similar to TLP informing the recipients of information what they can do with the received information.