Threat Intelligence Platforms

 

    • Cyber Threat Intelligence
      • Analyzed cyber threat data giving a strategic and tactical advantage over the adversary.
      • Offense informs defense
      • Intelligence
        • Taking in external information from a variety of sources and analyzing it against existing requirements in order to 
          provide an assessment that will affect decision making.
        • Examples:
          • Weather Report: Do I need to bring a coat today?
          • Traffic Report: How much time do I need to get to work?
      • Threat Intelligence
        • combination of intent, capability and opportunity.
          • Intent is a malicious actor’s desire to target your organization
          • Capability is their means to do so (such as specific types of malware)
          • Opportunity is the opening the actor needs (such as vulnerabilities, whether it be in software, hardware, or personnel)
      • Cyber Threat Intelligence
        • the analysis of how adversaries use the cyber domain to accomplish their goals.
            • TIP Workflow
              • a threat intelligence platform does not produce intelligence for you. It enables you to
                 
                store and query the threat information and intelligence you have created on your own or obtained from others.
           
            • A free, open-source analyst favorite
            • Capability of high-volume indicator storage
            • Great web UI and REST API interface
            • Classification and sharing functionality
            • Flexible indicator storage
            • Easy import/export
            • Integrates with TheHive for automated storage/analysis
            • Terminology
              • Events:
                • the object type that everything in MISP is centered around.
                • Events have unique ID numbers associated with them and act as parent containers to hold a group of attributes.
              • Attributes:
                • the individual bits of data that are being tracked about an event.
                • Attributes that are identical across multiple events will be highlighted for correlation.
              • Categories:
                • describe how that attribute was used.
                • Ex: for a md5 hash, categories available are "payload delivery", "artifacts dropped", "payload installation", and
                   "external analysis."
              • Type:
                • the type of attribute you are entering.
                • Ex:  md5, sha1, user-agent, email-subject, mime-type.
              • Instances:
                • are a single running copy of the MISP process and are important to keep straight because, by nature, MISP is
                   made to
                  facilitate sharing.
                • One instance of MISP can be linked to other copies for selective sharing of information within an 
                  organization, or with external organizations.
              • Sightings:
                • a simple "thumbs up" and "thumbs down mechanism developed to lend credibility to each attribute.
                • The intention is for analysts to indicate when they’ve run into the indicator, whether it was a true positive
                   (thumbs up) or a false positive (thumbs down).
                  • This way, each attribute can develop a reputation over time and bad or useless attributes can be expired.
              • Tags:
                • arbitrary data that can be attached at the event level to information being stored in MISP.
              • Taxonomies
                • pre-made lists of tags that can be defined and enabled within MISP.
                • Ex: there is a kill-chain taxonomy that creates tags called "kill-chain:Delivery" and "kill-chain:Installation".
              • Galaxies
                • similar to tags in that they label an event as part of a larger group but come broken down into families of options 
                  called "clusters" which are a pre-set group of values, sort of like a taxonomy of tags.
                • Ex:  there may be a "threat actor" galaxy intended to track the names of adversary groups.
            • Analyst Usage:
              • Analyst creates new event
              • All indicators, links, files, and notes are added as attributes
              • Tags and other classifications (galaxies) applied
              • Event reviewed, published to other organizations (if desired)
            • Automated usage through SOC tools:
              • SIEM, SOAR, IMS use API to look up or push attributes to event.
              • Subscribed feeds automatically download external event data.
              • Anytime any of them are seen in live traffic = Alert.

             

             

           
            
Previous Post Next Post
Adv
AdSense advertisment Blog end
Adv

Contact Form