Security Operations Tools
Threat Intelligence Reference
Search threat intelligence concepts. Covers TI types, MITRE ATT&CK tactics and techniques, IOC types, TLP classification, and threat actor attribution.
No data is transmitted — everything runs locallyTool
About this tool
Threat Intelligence Reference
The Threat Intelligence Reference covers TI types, MITRE ATT&CK, IOC types, TLP protocol, Diamond Model, and threat actor attribution categories.
• Look up MITRE ATT&CK tactics before a threat model exercise
• Reference TLP classification before sharing threat intelligence externally
• Find threat actor attribution categories before a threat landscape presentation
• Look up IOC types and their shelf life before building a TI program
Next step
Attack Surface Calculator — Calculate external attack surface score from internet-facing services, open ports, and unprotected accounts.
Open Attack Surface Calculator →
FAQ
What does this tool tell you?
The Threat Intelligence Reference covers TI types, MITRE ATT&CK, IOC types, TLP protocol, Diamond Model, and threat actor attribution categories.
What affects the result most?
Threat intelligence types: strategic (executive), tactical (TTPs), operational (current campaigns), technical (IOCs). MITRE ATT&CK: adversary tactics, techniques, and procedures framework — 14 tactics, 200+ techniques. IOC types: IP, domain, hash, URL, email — tactical, short shelf-life.
How should I use the result?
Use this tool to orient quickly to the concepts, field names, or values you are about to look up in a full specification or vendor documentation. It summarizes the common cases; the authoritative source remains whichever standard or vendor doc defines the values themselves.