TTI added

pull/54/head
Alexandre Dulaunoy 2016-12-18 13:03:42 +01:00
parent 51379e011a
commit f79edc8c1b
1 changed files with 5 additions and 0 deletions

View File

@ -35,6 +35,7 @@ The following taxonomies are described:
- [OSINT Open Source Intelligence - Classification](./osint) - [OSINT Open Source Intelligence - Classification](./osint)
- [Stealth Malware Taxonomy as defined by Joanna Rutkowska](./stealth-malware) - [Stealth Malware Taxonomy as defined by Joanna Rutkowska](./stealth-malware)
- [The Permissible Actions Protocol - or short: PAP - was designed to indicate how the received information can be used.](./PAP) - [The Permissible Actions Protocol - or short: PAP - was designed to indicate how the received information can be used.](./PAP)
- [Targeted Threat Index is a metric for assigning an overall threat ranking score to email messages that deliver malware to a victims computer.](./targeted-threat-index)
- [TLP - Traffic Light Protocol](./tlp) - [TLP - Traffic Light Protocol](./tlp)
- Vocabulary for Event Recording and Incident Sharing [VERIS](./veris) - Vocabulary for Event Recording and Incident Sharing [VERIS](./veris)
@ -123,6 +124,10 @@ Marking of Classified and Unclassified materials as described by the North Atlan
Open Threat Taxonomy v1.1 base on James Tarala of SANS [ref](http://www.auditscripts.com/resources/open_threat_taxonomy_v1.1a.pdf). Open Threat Taxonomy v1.1 base on James Tarala of SANS [ref](http://www.auditscripts.com/resources/open_threat_taxonomy_v1.1a.pdf).
### [Targeted Threat Index is a metric for assigning an overall threat ranking score to email messages that deliver malware to a victims computer.](./targeted-threat-index)
The Targeted Threat Index is a metric for assigning an overall threat ranking score to email messages that deliver malware to a victims computer. The TTI metric was first introduced at SecTor 2013 by Seth Hardy as part of the talk “RATastrophe: Monitoring a Malware Menagerie” along with Katie Kleemola and Greg Wiseman. [More info about TTI[(https://citizenlab.org/2013/10/targeted-threat-index/).
### [The Permissible Actions Protocol - or short: PAP - was designed to indicate how the received information can be used.](./PAP) ### [The Permissible Actions Protocol - or short: PAP - was designed to indicate how the received information can be used.](./PAP)
The Permissible Actions Protocol - or short: PAP - was designed to indicate how the received information can be used. It's a protocol/taxonomy similar to TLP informing the recipients of information what they can do with the received information. The Permissible Actions Protocol - or short: PAP - was designed to indicate how the received information can be used. It's a protocol/taxonomy similar to TLP informing the recipients of information what they can do with the received information.