| The US Central Intelligence Agency |
The traditional Intelligence cycle describes how intelligence is ideally processed in civilian and military intelligence agencies, and law enforcement organizations. |
the-intelligence-cycle.html |
| Recorded Future |
The traditional intelligence life cycle tailored to threat intelligence embedded in modern security operations |
What the 6 Phases of the Threat Intelligence Lifecycle Mean for Your Team |
| The US Central Intelligence Agency |
This primer highlights structured analytic techniques—some widely used in the private sector and academia, some unique to the intelligence profession |
Tradecraft-Primer-apr09.pdf |
| iSIGHT Partners |
The first definitive guide to cyber threat intelligence ever produced |
cti-guide.pdf |
| David J. Bianco |
Analysing relationships between the types of indicators you might use to detect an adversary's activities and how much pain it will cause them when you are able to deny those indicators to them |
the-pyramid-of-pain.html |
| Center for Cyber Intelligence Analysis and Threat Research |
The Diamond Model: a novel model of intrusion analysis built by analysts, derived from years of experience |
diamond.pdf |
| Lockheed Martin |
The Cyber Kill Chain® framework is part of the Intelligence Driven Defense® model for the identification and prevention of cyber intrusions activity. The model identifies what the adversaries must complete in order to achieve their objective |
Cyber_Kill_Chain.pdf |
| SANS |
SANS shared a Cyber Kill Chain tailored to Industrial Control Systems (ICS), written by Michael J. Assante and Robert M. Lee. |
The Industrial Control System Cyber Kill Chain |
| Mercyhurst University Institute for Intelligence Studies |
The Analyst’s Style Manual is a product intended to assist student analysts with the many perplexing and complex rules they should follow in producing written intelligence products |
analysts_style_manual.pdf |
| Freddy M |
The Intelligence Architecture Map is based on interviews of industry experts, former intelligence practitioners, and Freddy's personal views. It represents a logical and meaningful way of how different aspects of producing intelligence should be put together. |
intelligence-architecture-map-freddy-m |
| Grace Chi |
IS SHARING CARING? A comprehensive study on the current cyber threat intelligence inter-personal and social networking practices, results, and attitudes |
ctinetworkingreport2022.pdf |
| Institute for Software Research School of Computer Science Carnegie Mellon University |
A paper from the Carnegie Mellon ISR on the life-cycle of an advanced persistent threat group attack, from reconnaissance to data exfiltration |
CMU-ISR-17-100.pdf |
| John Boyd |
The OODA loop is the cycle observe–orient–decide–act. The approach explains how agility can overcome raw power in dealing with human opponents. It is especially applicable to cyber security and cyberwarfare. |
OODA_Loop.html |
| RAND Corporation |
RAND’s Four-Step Scalable Warning and Resilience Model |
RAND_RRA382-1.pdf |
| UK National Anti Fraud Network |
Basics of Intelligence Management, including classification, evaluation, dissemination, and the intelligence confidence matrix |
Intelligence%20Management%20Training.pdf |
| International Journal of Intelligence and CounterIntelligence |
An argument that CTI is a product without a process, which has several underlying causes and consequences for the CTI practice. It is also argues that the field needs to implement traditional intelligence analysis and methodology, rather than add more technology |
Cyber Threat Intelligence: A Product Without a Process? |
| mxm0z |
This is a collection of great and very useful resources concerning intelligence writing such as manuals/guides, standards, books, and articles |
Awesome Intelligence Writing |
| threat-intelligence.eu |
Technical standards related to threat intelligence |
Standards related to Threat Intelligence |