Skip to main content

Authoritative Bibliography

Purpose

Separate doctrine authority from author inspiration. Medium articles can explain how the author thinks, but doctrine-heavy CTI pages must anchor to primary standards, original papers, or strong practitioner references.

Bibliography Rules

  • Use primary sources when a framework has an official maintainer or original paper.
  • Use vendor blogs for campaign-specific reporting, not for doctrine unless the vendor owns the framework or tool.
  • Use Medium articles as author context, not as the only authority for analytic discipline.
  • Record access date for unstable web references in the source register when the reference is used in a finished assessment.
  • Archive or mirror only where licensing allows it. If not, store the citation and access metadata.

CTI Frameworks and Intrusion Analysis

ReferenceAuthor / MaintainerUse In ManualURL
ATT&CK frameworkMITREBehavior mapping, technique limits, detection coveragehttps://attack.mitre.org/
ATT&CK use guidance — threat-informed defenseMITREMapping discipline; not attribution evidencehttps://attack.mitre.org/resources/
The Diamond Model of Intrusion AnalysisCaltagirone, Pendergast, Betz (2013)Intrusion event modeling and pivot disciplinehttps://www.activeresponse.org/wp-content/uploads/2013/07/diamond.pdf
Diamond Model — GCA wiki mirrorGlobal Cyber AllianceSecondary reference; 403 from automated checkers, accessible in browserhttps://act.globalcyberalliance.org/index.php/The_Diamond_Model_of_Intrusion_Analysis
Cyber Kill ChainHutchins, Cloppert, Amin — Lockheed Martin (2011)Intrusion lifecycle reasoning; not forced chronologyhttps://www.lockheedmartin.com/content/dam/lockheed-martin/rms/documents/cyber/LM-White-Paper-Intel-Driven-Defense.pdf
Pyramid of PainDavid Bianco (2013)Indicator tiering and detection durabilityhttps://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html

Intelligence Analysis Tradecraft

ReferenceAuthor / MaintainerUse In ManualURL
Words of Estimative ProbabilitySherman Kent, CIA Center for Study of IntelligenceEstimative language calibration and confidence disciplinehttps://www.cia.gov/resources/csi/static/Words-of-Estimative-Probability.pdf
Psychology of Intelligence AnalysisRichards J. Heuer Jr., CIA (1999)Cognitive bias, alternative hypotheses, structured analytic techniquehttps://www.cia.gov/resources/csi/static/psychology-of-intelligence-analysis.pdf
Structured Analytic Techniques for Intelligence AnalysisHeuer and Pherson (2014)SAT methods including ACH, key assumptions check, devil's advocacyhttps://us.sagepub.com/en-us/nam/structured-analytic-techniques-for-intelligence-analysis/book258204
NATO STANAG 2511 / Admiralty CodeNATO Allied PublicationA-F / 1-6 source evaluation modelReferenced via MISP admiralty-scale taxonomy
MISP admiralty-scale taxonomyMISP projectPractical implementation of A-F/1-6 in structured CTI toolshttps://www.misp-project.org/taxonomies.html

CTI Standards and Data Exchange

ReferenceAuthor / MaintainerUse In ManualURL
STIX 2.1 specificationOASIS CTI TCStructured indicator and relationship representationhttps://oasis-open.github.io/cti-documentation/
TAXII 2.1 specificationOASIS CTI TCTransport and collection exchange modelhttps://docs.oasis-open.org/cti/taxii/v2.1/os/taxii-v2.1-os.html
MISP documentationMISP projectCTI platform, object modeling, sharing disciplinehttps://www.misp-project.org/documentation/
MISP core formatMISP standardIndicator and event structurehttps://www.misp-standard.org/rfc/misp-standard-core.html
TLP 2.0FIRSTSharing boundaries and public release handlinghttps://www.first.org/tlp/
FIRST CVSSFIRSTVulnerability severity scoring referenced in threat prioritizationhttps://www.first.org/cvss/

Detection Engineering and Threat Hunting

ReferenceAuthor / MaintainerUse In ManualURL
Sigma rule specificationSigma project / Florian Roth et al.Detection rule portability and DRL-4 to DRL-9 promotionhttps://sigmahq.io/docs/
ATT&CK data sourcesMITRETelemetry requirements and detection coverage mappinghttps://attack.mitre.org/datasources/
Detection Engineering Maturity Matrix (DEMM)Kyle BaileyOrganizational detection maturity; context for DRL modelhttps://kyle-bailey.medium.com/detection-engineering-maturity-matrix-f4f3181a5cc7
Threat Hunting with ElasticElastic SecurityHunt hypothesis structure and lookback window disciplinehttps://www.elastic.co/guide/en/security/current/index.html
TaHiTI threat hunting methodologyFI-ISAC / RabobankStructured hunt lifecycle from intelligence requirement to reporthttps://www.betaalvereniging.nl/wp-content/uploads/FI-ISAC-use-case-TaHiTI-1.0.pdf

SOC Operations and Incident Response

ReferenceAuthor / MaintainerUse In ManualURL
NIST SP 800-61r2 — Computer Security Incident Handling GuideNISTIncident response lifecycle aligned with SOC handoff modelhttps://nvlpubs.nist.gov/nistpubs/SpecialPublications/NIST.SP.800-61r2.pdf
CISA Incident Response PlaybooksCISAGovernment-grade IR playbook structurehttps://www.cisa.gov/sites/default/files/publications/Federal_Government_Cybersecurity_Incident_and_Vulnerability_Response_Playbooks_508C.pdf
NIST Cybersecurity Framework 2.0NISTGovern, Identify, Protect, Detect, Respond, Recover — aligned with SOC/CTI workflowhttps://www.nist.gov/cyberframework

AI in CTI and Governance

ReferenceAuthor / MaintainerUse In ManualURL
NIST AI Risk Management Framework (AI RMF 1.0)NISTAI governance structure for CTI tool use and AI output reviewhttps://airc.nist.gov/Home
OWASP Top 10 for LLM ApplicationsOWASPPrompt injection, hallucination, and data leakage controlshttps://owasp.org/www-project-top-10-for-large-language-model-applications/
EU AI Act (Regulation 2024/1689)European Parliament and CouncilHigh-risk AI classification relevant to AI-assisted CTI in regulated contextshttps://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX%3A32024R1689
Anthropic model cardsAnthropicCapability and limitation documentation for Claude models used in AI-CTI workflowshttps://www.anthropic.com/model-card

Infrastructure Pivoting and OSINT

ReferenceAuthor / MaintainerUse In ManualURL
RiskIQ PassiveTotal documentationMicrosoft Defender Threat IntelligencePassive DNS methodology and API referencehttps://learn.microsoft.com/en-us/defender/threat-intelligence/
Censys documentationCensysInternet-wide scanning, certificate pivoting, ASN enrichmenthttps://support.censys.io/hc/en-us
Shodan documentationShodanBanner-based device and service pivotinghttps://help.shodan.io/
VirusTotal documentationGoogle / VirusTotalHash, URL, domain, and IP pivoting for malware infrastructurehttps://docs.virustotal.com/
SANS FOR578 — Cyber Threat IntelligenceSANS InstituteFull CTI methodology including infrastructure pivoting and actor researchhttps://www.sans.org/cyber-security-courses/cyber-threat-intelligence/

Sector CTI — Telecom

ReferenceAuthor / MaintainerUse In ManualURL
ENISA Threat Landscape for TelecommunicationsENISAThreat actor targeting, TTP coverage, and control recommendations for telecomhttps://www.enisa.europa.eu/topics/cyber-threats/threats-and-trends
GSMA FS.11 — Network Equipment Security Assurance SchemeGSMATelecom equipment security baseline; relevant to SS7/Diameter threat contexthttps://www.gsma.com/security/network-equipment-security-assurance-scheme/
CISA — Known Exploited Vulnerabilities (KEV)CISAAuthoritative patch prioritization; covers telecom and edge device CVEshttps://www.cisa.gov/known-exploited-vulnerabilities-catalog
3GPP security specifications3GPP5G authentication and protocol security relevant to SS7/5G threat mappinghttps://www.3gpp.org/specifications-technologies/topics/security

Sector CTI — Cloud and Identity

ReferenceAuthor / MaintainerUse In ManualURL
CSA Cloud Controls Matrix (CCM)Cloud Security AllianceControl mapping for cloud-native threat analysishttps://cloudsecurityalliance.org/research/cloud-controls-matrix/
CISA Cloud Security Technical Reference ArchitectureCISAFederal cloud security model; relevant for cloud CTI contexthttps://www.cisa.gov/resources-tools/resources/cisa-cloud-security-technical-reference-architecture
Microsoft Entra ID security documentationMicrosoftIdentity-plane telemetry, Conditional Access, audit log fieldshttps://learn.microsoft.com/en-us/entra/identity/
AWS Security documentationAWSCloud audit log fields (CloudTrail), IAM abuse patternshttps://docs.aws.amazon.com/security/
GCP Security Command Center documentationGoogle CloudCloud-native detection and audit log referencehttps://cloud.google.com/security-command-center/docs

How To Use This Page

When a doctrine page cites a framework, it should link to the relevant authority in this bibliography and explain the practical CTI application. Do not turn reference links into proof of a campaign claim. Campaign claims still require source-specific evidence, freshness date, and evidence labels.

Access dates should be recorded in the source register when a reference is used in a finished assessment. For PDFs and unstable URLs, note the archive URL or access date explicitly.