From 6a6632b61ac422931c9cfe0d2cca1151c5aff6fc Mon Sep 17 00:00:00 2001 From: Kyle Maxwell Date: Tue, 15 Mar 2016 00:56:32 -0400 Subject: [PATCH] Fixes to grammar and spelling --- README.md | 76 +++++++++++++++++++++++++++---------------------------- 1 file changed, 38 insertions(+), 38 deletions(-) diff --git a/README.md b/README.md index 1ffb215..eab01a5 100644 --- a/README.md +++ b/README.md @@ -15,7 +15,7 @@ Feel free to [contribute](CONTRIBUTING.md). ## Sources Most of the resources listed below provide lists and/or APIs to obtain (hopefully) up-to-date information with regards to threats. -Some consider these sources as threat intelligence, opinions differ however. +Some consider these sources as threat intelligence, opinions differ however. A certain amount of (domain- or business-specific) analysis is necessary to create true threat intelligence. @@ -25,7 +25,7 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea + - + + + Deepviz offers a sandbox for analyzing malware and has an API available with threat intelligence harvested from the sandbox. + @@ -87,17 +87,17 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea - + - + + - + +
The free threat intelligence parsed and aggregated by Critical Stack is ready for use in any Bro production system. You can specify which feeds you trust and want to ingest. -
@@ -33,15 +33,15 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea Cymon is an aggregator of indicators from multiple sources with history, so you have a single interface to multiple threat feeds. It also provides an API to search a database along with a pretty web interface. -
Deepviz Threat Intel - Deepviz offers a sandbox for analyzing malware and has an API available with threat intelligence harvested from the sandbox. -
@@ -64,7 +64,7 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea Hail a TAXII - Hail a TAXII.com is a repository of Open Source Cyber Threat Intellegence feeds in STIX format. They offer several feeds, including some that are listed here already in a different format, like the Emerging Threats rules and PhishTank feeds. + Hail a TAXII.com is a repository of Open Source Cyber Threat Intelligence feeds in STIX format. They offer several feeds, including some that are listed here already in a different format, like the Emerging Threats rules and PhishTank feeds.
OpenPhish Feeds Conf + OpenPhish receives URLs from multiple streams and analyzes them using its proprietary phishing detection algorithms. There are free and commercial offerings available. -
PhishTank Conf + PhishTank delivers a list of suspected phishing URLs. Their data comes from human reports, but they also ingest external feeds where possible. It's a free service, but registering for an API key is sometimes necessary. -
@@ -105,7 +105,7 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea SSL Blacklist (SSLBL) is a project maintained by abuse.ch. The goal is to provide a list of "bad" SSL certificates identified by abuse.ch to be associated with malware or botnet activities. SSLBL relies on SHA1 fingerprints of malicious SSL certificates and offers various blacklists -
@@ -114,8 +114,8 @@ A certain amount of (domain- or business-specific) analysis is necessary to crea ThreatMiner has been created to free analysts from data collection and to provide them a portal on which they can carry out their tasks, from reading reports to pivoting and data enrichment. The emphasis of ThreatMiner isn't just about indicators of compromise (IoC) but also to provide analysts with contextual information related to the IoC they are looking at. -
## Formats @@ -125,11 +125,11 @@ Standardized formats for sharing Threat Intelligence (mostly IOCs). + + + + + - + + - + + - + +
- CAPEC + CAPEC The Common Attack Pattern Enumeration and Classification (CAPEC) is a comprehensive dictionary and classification taxonomy of known attacks that can be used by analysts, developers, testers, and educators to advance community understanding and enhance defenses. -
@@ -137,7 +137,7 @@ Standardized formats for sharing Threat Intelligence (mostly IOCs). The Cyber Observable eXpression (CybOX) language provides a common structure for representing cyber observables across and among the operational areas of enterprise cyber security that improves the consistency, efficiency, and interoperability of deployed tools and processes, as well as increases overall situational awareness by enabling the potential for detailed automatable sharing, mapping, detection, and analysis heuristics. -
@@ -145,7 +145,7 @@ Standardized formats for sharing Threat Intelligence (mostly IOCs). The Incident Object Description Exchange Format (IODEF) defines a data representation that provides a framework for sharing information commonly exchanged by Computer Security Incident Response Teams (CSIRTs) about computer security incidents. -
@@ -153,7 +153,7 @@ Standardized formats for sharing Threat Intelligence (mostly IOCs). Experimental - The purpose of the Intrusion Detection Message Exchange Format (IDMEF) is to define data formats and exchange procedures for sharing information of interest to intrusion detection and response systems and to the management systems that may need to interact with them. -
@@ -161,7 +161,7 @@ Standardized formats for sharing Threat Intelligence (mostly IOCs). The Malware Attribute Enumeration and Characterization (MAEC) projects is aimed at creating and providing a standardized language for sharing structured information about malware based upon attributes such as behaviors, artifacts, and attack patterns. -
@@ -169,24 +169,24 @@ Standardized formats for sharing Threat Intelligence (mostly IOCs). The Structured Threat Information eXpression (STIX) language is a standardized construct to represent cyber threat information. The STIX Language intends to convey the full range of potential cyber threat information and strives to be fully expressive, flexible, extensible, and automatable. STIX does not only allow tool-agnostic fields, but also provides so-called test mechanisms that provide means for embedding tool-specific elements, including OpenIOC, Yara and Snort. -
TAXII The Trusted Automated eXchange of Indicator Information (TAXII) standard defines a set of services and message exchanges that, when implemented, enable sharing of actionable cyber threat information across organization and product/service boundaries. TAXII defines concepts, protocols, and message exchanges to exchange cyber threat information for the detection, prevention, and mitigation of cyber threats. -
VERIS The Vocabulary for Event Recording and Incident Sharing (VERIS) is a set of metrics designed to provide a common language for describing security incidents in a structured and repeatable manner. VERIS is a response to one of the most critical and persistent challenges in the security industry - a lack of quality information. In addition to providing a structuref format, VERIS also collects data from the community to report on breaches in the Verizon Data Breach Investigations Report (DBIR) and publishes this database online at VCDB.org. -
## Frameworks and Platforms @@ -223,7 +223,7 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari IntelMQ - IntelMQ is a solution for CERTs for collecting and processing security feeds, pastebins, tweets using a message queue protocol. It's a community driven initiative called IHAP (Incident Handling Automation Project) which was conceptually designed by European CERTs during several InfoSec events. Its main goal is to give to incident responders an easy way to collect & process threat intelligence thus improving the incident handling processes of CERTs. + IntelMQ is a solution for CERTs for collecting and processing security feeds, pastebins, tweets using a message queue protocol. It's a community driven initiative called IHAP (Incident Handling Automation Project) which was conceptually designed by European CERTs during several InfoSec events. Its main goal is to give to incident responders an easy way to collect & process threat intelligence thus improving the incident handling processes of CERTs. @@ -255,7 +255,7 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari MISP - The Malware Information Sharing Platform (MISP) is an open source software solution for collecting, storing, distributing and sharing cyber security indicators and malware analysis. + The Malware Information Sharing Platform (MISP) is an open source software solution for collecting, storing, distributing and sharing cyber security indicators and malware analysis. @@ -271,7 +271,7 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari OpenTAXII - OpenTAXII is a robust Python implementation of TAXII Services that delivers a rich feature set and a friendly pythonic API built on top of a well designed application. + OpenTAXII is a robust Python implementation of TAXII Services that delivers a rich feature set and a friendly Pythonic API built on top of a well designed application. @@ -313,7 +313,7 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari ThreatCrowd is a system for finding and researching artefacts relating to cyber threats. - + ThreatExchange @@ -329,7 +329,7 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari DPS' Lightweight Investigation Notebook. - + XFE - X-Force Exchange @@ -344,7 +344,7 @@ Frameworks, platforms and services for collecting, analyzing, creating and shari ## Tools -All kinds of tools for parsing, creating and editing Theat Intelligence. Mostly IOC based. +All kinds of tools for parsing, creating and editing Threat Intelligence. Mostly IOC based. @@ -416,7 +416,7 @@ All kinds of tools for parsing, creating and editing Theat Intelligence. Mostly ioc_writer @@ -491,7 +491,7 @@ All kinds of tools for parsing, creating and editing Theat Intelligence. Mostly QRadio is a tool/framework designed to consolidate cyber threats intelligence sources. The goal of the project is to establish a robust modular framework for extraction of intelligence data from vetted sources. - + - + @@ -547,7 +547,7 @@ All kinds of tools for parsing, creating and editing Theat Intelligence. Mostly - +
- Provides a python library that allows for basic creation and editing of OpenIOC objects. + Provides a Python library that allows for basic creation and editing of OpenIOC objects.
TAXII Test Server @@ -523,7 +523,7 @@ All kinds of tools for parsing, creating and editing Theat Intelligence. Mostly Cli interface to ThreatCrowd.
Threatelligence @@ -537,7 +537,7 @@ All kinds of tools for parsing, creating and editing Theat Intelligence. Mostly ThreatTracker - A Python script designed to monitor and generate alerts on given sets of IOCs indexed by a set of Google Custom Search Engines. + A Python script designed to monitor and generate alerts on given sets of IOCs indexed by a set of Google Custom Search Engines.
Several APIs for Threat Intelligence integrated in a single package. Included are: OpenDNS Investigate, VirusTotal and ShadowServer.
tiq-test @@ -570,7 +570,7 @@ All kinds of reading material about Threat Intelligence. Includes (scientific) r APTnotes - A great collection of sources regarding Advanced Persistent Threats (APTs). These reports usually include strategic and tactical knowledge or advice. + A great collection of sources regarding Advanced Persistent Threats (APTs). These reports usually include strategic and tactical knowledge or advice.