From 9a22653f822bdce4f6bce83bc0ba1654bcd5c130 Mon Sep 17 00:00:00 2001 From: Rich Piazza Date: Mon, 5 Mar 2018 15:04:23 -0500 Subject: [PATCH] Update README.md added text for CAPEC --- README.md | 13 ++++++++++++- 1 file changed, 12 insertions(+), 1 deletion(-) diff --git a/README.md b/README.md index 032e94bfd9..f8ca017291 100755 --- a/README.md +++ b/README.md @@ -1,5 +1,5 @@ # cti -Cyber Threat Intelligence Repository of ATT&CK catalog expressed in STIX 2.0 JSON. See [USAGE](USAGE.md) for information on using this content with [python-stix2](https://github.com/oasis-open/cti-python-stix2). +The Cyber Threat Intelligence Repository of ATT&CK and CAPEC catalogs expressed in STIX 2.0 JSON. See [USAGE](USAGE.md) for information on using this content with [python-stix2](https://github.com/oasis-open/cti-python-stix2). ## ATT&CK ATT&CK is a catalog of techniques and tactics that describe post-compromise adversary behavior on typical enterprise IT environments. The core use cases involve using the catalog to analyze, triage, compare, describe, relate, and share post-compromise adversary behavior. @@ -14,3 +14,14 @@ STIX enables organizations to share CTI with one another in a consistent and mac STIX is designed to improve many different capabilities, such as collaborative threat analysis, automated threat exchange, automated detection and response, and more. https://oasis-open.github.io/cti-documentation/ + +## CAPEC + +Understanding how the adversary operates is essential to effective cyber security. CAPECâ„¢ helps by providing a comprehensive dictionary of known patterns of attacks employed by adversaries to exploit known weaknesses in cyber-enabled capabilities. It can be used by analysts, developers, testers, and educators to advance community understanding and enhance defenses. + + - Focuses on application security + - Enumerates exploits against vulnerable systems + - Includes social engineering / supply chain + - Associated with Common Weakness Enumeration (CWE) + +https://capec.mitre.org/