SlideShare a Scribd company logo
Threat Intelligence
• Information about adversaries
 Intelligence gathered about adversaries
 Threat landscape
• Need to understand how adversaries operate
• Broad -> Specific
 Broad to understand their techniques, useful for hunting + anomaly based searches
 Specific to understand exactly what they look like, useful for signatures
• Learn the tools, techniques, and infrastructure of adversaries
• Threat landscapes vary between organizations
 Even by the same adversary
Incident
Response
1
Understand your risk
• To begin to understand the threat, you need to characterize your org’s risk
• Risk == Vulnerability + Impact + Threat
• Vulnerability
 What exposure does your system have?
 Any known weaknesses that could be leveraged?
• Impact
 What happens if you are compromised?
 Not something that can be changed by the organization, often just a factor of what what
the organization is/has
• Threat
Incident
Response
2
Risk – the threat
• Why would an adversary want to compromise the org?
• Does the adversary want to compromise the org?
 Do they gain anything?
 What do they gain?
• What capabilities does the adversary have?
• Does the adversary have the technical capability for successful compromise?
• Do identified vulnerabilities align with an adversary’s capabilities?
Incident
Response
3
Threat Intelligence
• The idea is to have more risks in the known knowns category
 Ideally, as few unknown unknowns as possible
• Can come from many different sources
 News report about an attack on a flaw
 -to-
 Learning how an adversary is targeting a competing organization
• The UK’s National Cyber Security Centre divides threat intelligence into four
categories
 Strategic
 Operational
 Tactical
 Technical
Incident
Response
4
Strategic Intelligence
• High level
• Typically acquired at the board or high senior manager level
• Not technical information
• Typically about an attack’s potential
 Financial impact
 Impact on business decisions
• Example:
 A report states a foreign government hacks into foreign companies with direct
competitors in their own nation
 Your organization is identified as a competitor
Incident
Response
5
Operational Intelligence
• Information about a specific incoming attack
• Typically acquired by high level security staff
• Rarely available
 Typically only a government has access to such information
 No legal way for private companies to access this info on their own
• Rare cases the info may be available
 Public actors (hacktivists)
 Link cyber attacks to real world events
Incident
Response
6
Tactical Intelligence
• Information about how adversaries are conducting their attacks
• TTPs – Tactics, Techniques, and Procedures
• Typically acquired by defenders and incident responders
• Example:
 Learning an adversary is using psexec to move laterally
 Block remote logins by admins and/or log and monitor this activity
• Typically obtained through:
 Talking with other defenders about what they’re seeing
 Purchasing a threat feed of this information
 White papers
Incident
Response
7
Technical Intelligence
• Deeply technical data consumed through technical methods
• Example:
 Feed of malicious IP addresses
 Feed of malicious domain names
 Feed of malicious software hashes
• Often a short timeline – attackers can change IP addresses
• Often feeds monitoring and alerting solutions
Incident
Response
8
Threat Intelligence Feeds
• Feed of indicators or artifacts from a third party
• Often focus on one indicator area
 IP addresses
 Domains
 Hashes
• Real-time
 Automatically updates with the latest available threat information
• Some free feeds, many paid feeds
• Six main data source types – ideally cover as many as possible
 Open Source
 Customer telemetry
 Honeypots
 Scanning/crawling
 Malware processing
 Human intelligence
Incident
Response
9
Indicator of Compromise (IOC)
• Identifies characteristics of malware
 Host-based and network-based characteristics
• Can be used to identify the presence of malware on a compromised host
• IOCs are typically created by reversing malware
• Professional responders typically have large IOC lists collected from
previous intrusions they have worked
• IOCs can save you time when analyzing multiple hosts
 Even if you only have one IOC for one piece of malware you found
• Various ”standard” languages to share indicators and threat intelligence
Incident
Response
10
Standard sharing languages
• Standardization is important!
 Makes sharing easier
 Makes working with multiple data sources easier
• Different logs often refer to the same thing by different names
 Logged on
 Login success
 Accepted password
 Account Logon
• Sharing between different systems within the organization
• Sharing with other organizations
• Need a common language to speak
Incident
Response
11
CybOX
• Cybox.mitre.org
• Cyber Observable eXpression
• Standardized schema for describing observable events
 Event logging
 Malware characterization
 Intrusion detection
 Incident response
 Attack pattern characterization
• Standard structure and content
• …has been rolled into STIX the past few years
Incident
Response
12
STIX
• Stix.mitre.org
• Structured Threat Information eXpression
• Community driven
• Standardized language to represent structured threat information
• Some examples:
 Malware Indicator for File Hash
 File Hash Reputation
 Incident Essentials – Who, What, When
 Affected Asset list
 Command and Control IP List
Incident
Response
13
YARA
• Tool used to help identify and classify malware
 “Pattern matching swiss knife for malware researchers (and everyone else)”
• Create descriptions based
on patterns
• Each rule has a set of strings
and Boolean logic
• Any file containing one of the
three strings is reported as
a silent_banker match
Incident
Response
14
OpenIOC
• Openioc.org
• Open framework for threat intelligence sharing
• Originally designed for Mandiant’s products
 Has since been standardized and open sourced
• IOCs are stored as XML
• IOC is made up of three major parts
 IOC Metadata
 Author of the IOC, Name of the IOC, description, etc.
 References
 Investigation name, case number, comments, etc
 Definition
 The content of the IOC itself – artifacts, MD5 hash, registry path, etc.
Incident
Response
15
OpenIOC
• IOC Editor
 Allows users to work with indicators in XML format
 Manage the fields within the IOCs
 Edit the IOCs
• IOC Finder
 Search for IOCs on a single host
 Can be used to test new OICs
 Can be used to find malware on hosts
 IOC hit reporting in various formats, including HTML and text
 Reports for single or multiple hosts
Incident
Response
16
Lab - OpenIOC
Incident
Response
17

More Related Content

PPTX
07 - Indicators and Intelligence .pptx new
PDF
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
PPTX
Chapter I Introduction To Cyber Intelligence.pptx
PPTX
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
PPTX
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
PPTX
What is Threat Hunting? - Panda Security
PPTX
Web hacking 1.0
PDF
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...
07 - Indicators and Intelligence .pptx new
Threat Hunting by Falgun Rathod - Cyber Octet Private Limited
Chapter I Introduction To Cyber Intelligence.pptx
Open Secrets of the Defense Industry: Building Your Own Intelligence Program ...
Finding the Sweet Spot: Counter Honeypot Operations (CHOps) by Jonathan Creek...
What is Threat Hunting? - Panda Security
Web hacking 1.0
CNIT 121: 4 Getting the Investigation Started on the Right Foot & 5 Initial D...

Similar to 07 - Indicators and Intelligence00.pptx a presentation (20)

PPTX
How to build a cyber threat intelligence program
PPTX
Join the hunt: Threat hunting for proactive cyber defense.pptx
PDF
Threat Modeling to Reduce Software Security Risk
PPTX
Cyber Threat Hunting Workshop
PDF
Threat Intelligence 101 - Steve Lodin - Submitted
PDF
Caccia alle Minacce: Intelligence e Hunting nel cyberspace
PDF
Cyber Threat Hunting Workshop.pdf
PDF
Cyber Threat Hunting Workshop.pdf
PDF
ISACA Ethical Hacking Presentation 10/2011
PPTX
How To Turbo-Charge Incident Response With Threat Intelligence
PDF
CNIT 152: 4 Starting the Investigation & 5 Leads
PDF
How To Turbo-Charge Incident Response With Threat Intelligence
PDF
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
PPT
Ethical Hacking
PPTX
Cyber Week 8.pptx.......................
PPTX
Cyber threat-hunting---part-2-25062021-095909pm
PPTX
computer security principles and practice chapter 8
PPTX
Advanced Persistent Threats (APTs) - Information Security Management
PPTX
How to build a cyber threat intelligence program
Join the hunt: Threat hunting for proactive cyber defense.pptx
Threat Modeling to Reduce Software Security Risk
Cyber Threat Hunting Workshop
Threat Intelligence 101 - Steve Lodin - Submitted
Caccia alle Minacce: Intelligence e Hunting nel cyberspace
Cyber Threat Hunting Workshop.pdf
Cyber Threat Hunting Workshop.pdf
ISACA Ethical Hacking Presentation 10/2011
How To Turbo-Charge Incident Response With Threat Intelligence
CNIT 152: 4 Starting the Investigation & 5 Leads
How To Turbo-Charge Incident Response With Threat Intelligence
Security Consulting Services - Which Is The Best Option For Me? - Diego Sor, ...
Ethical Hacking
Cyber Week 8.pptx.......................
Cyber threat-hunting---part-2-25062021-095909pm
computer security principles and practice chapter 8
Advanced Persistent Threats (APTs) - Information Security Management
Ad

Recently uploaded (20)

PDF
Model Code of Practice - Construction Work - 21102022 .pdf
PDF
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
PPTX
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
PPT
introduction to datamining and warehousing
PPTX
additive manufacturing of ss316l using mig welding
PDF
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
PPTX
Lecture Notes Electrical Wiring System Components
PPTX
UNIT 4 Total Quality Management .pptx
PDF
Digital Logic Computer Design lecture notes
PPT
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
PDF
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
PDF
R24 SURVEYING LAB MANUAL for civil enggi
PDF
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
PPTX
Sustainable Sites - Green Building Construction
DOCX
573137875-Attendance-Management-System-original
PPTX
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
PPTX
OOP with Java - Java Introduction (Basics)
PPT
Mechanical Engineering MATERIALS Selection
PPTX
bas. eng. economics group 4 presentation 1.pptx
PPTX
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Model Code of Practice - Construction Work - 21102022 .pdf
Mohammad Mahdi Farshadian CV - Prospective PhD Student 2026
FINAL REVIEW FOR COPD DIANOSIS FOR PULMONARY DISEASE.pptx
introduction to datamining and warehousing
additive manufacturing of ss316l using mig welding
July 2025 - Top 10 Read Articles in International Journal of Software Enginee...
Lecture Notes Electrical Wiring System Components
UNIT 4 Total Quality Management .pptx
Digital Logic Computer Design lecture notes
Introduction, IoT Design Methodology, Case Study on IoT System for Weather Mo...
The CXO Playbook 2025 – Future-Ready Strategies for C-Suite Leaders Cerebrai...
R24 SURVEYING LAB MANUAL for civil enggi
Mitigating Risks through Effective Management for Enhancing Organizational Pe...
Sustainable Sites - Green Building Construction
573137875-Attendance-Management-System-original
M Tech Sem 1 Civil Engineering Environmental Sciences.pptx
OOP with Java - Java Introduction (Basics)
Mechanical Engineering MATERIALS Selection
bas. eng. economics group 4 presentation 1.pptx
CARTOGRAPHY AND GEOINFORMATION VISUALIZATION chapter1 NPTE (2).pptx
Ad

07 - Indicators and Intelligence00.pptx a presentation

  • 1. Threat Intelligence • Information about adversaries  Intelligence gathered about adversaries  Threat landscape • Need to understand how adversaries operate • Broad -> Specific  Broad to understand their techniques, useful for hunting + anomaly based searches  Specific to understand exactly what they look like, useful for signatures • Learn the tools, techniques, and infrastructure of adversaries • Threat landscapes vary between organizations  Even by the same adversary Incident Response 1
  • 2. Understand your risk • To begin to understand the threat, you need to characterize your org’s risk • Risk == Vulnerability + Impact + Threat • Vulnerability  What exposure does your system have?  Any known weaknesses that could be leveraged? • Impact  What happens if you are compromised?  Not something that can be changed by the organization, often just a factor of what what the organization is/has • Threat Incident Response 2
  • 3. Risk – the threat • Why would an adversary want to compromise the org? • Does the adversary want to compromise the org?  Do they gain anything?  What do they gain? • What capabilities does the adversary have? • Does the adversary have the technical capability for successful compromise? • Do identified vulnerabilities align with an adversary’s capabilities? Incident Response 3
  • 4. Threat Intelligence • The idea is to have more risks in the known knowns category  Ideally, as few unknown unknowns as possible • Can come from many different sources  News report about an attack on a flaw  -to-  Learning how an adversary is targeting a competing organization • The UK’s National Cyber Security Centre divides threat intelligence into four categories  Strategic  Operational  Tactical  Technical Incident Response 4
  • 5. Strategic Intelligence • High level • Typically acquired at the board or high senior manager level • Not technical information • Typically about an attack’s potential  Financial impact  Impact on business decisions • Example:  A report states a foreign government hacks into foreign companies with direct competitors in their own nation  Your organization is identified as a competitor Incident Response 5
  • 6. Operational Intelligence • Information about a specific incoming attack • Typically acquired by high level security staff • Rarely available  Typically only a government has access to such information  No legal way for private companies to access this info on their own • Rare cases the info may be available  Public actors (hacktivists)  Link cyber attacks to real world events Incident Response 6
  • 7. Tactical Intelligence • Information about how adversaries are conducting their attacks • TTPs – Tactics, Techniques, and Procedures • Typically acquired by defenders and incident responders • Example:  Learning an adversary is using psexec to move laterally  Block remote logins by admins and/or log and monitor this activity • Typically obtained through:  Talking with other defenders about what they’re seeing  Purchasing a threat feed of this information  White papers Incident Response 7
  • 8. Technical Intelligence • Deeply technical data consumed through technical methods • Example:  Feed of malicious IP addresses  Feed of malicious domain names  Feed of malicious software hashes • Often a short timeline – attackers can change IP addresses • Often feeds monitoring and alerting solutions Incident Response 8
  • 9. Threat Intelligence Feeds • Feed of indicators or artifacts from a third party • Often focus on one indicator area  IP addresses  Domains  Hashes • Real-time  Automatically updates with the latest available threat information • Some free feeds, many paid feeds • Six main data source types – ideally cover as many as possible  Open Source  Customer telemetry  Honeypots  Scanning/crawling  Malware processing  Human intelligence Incident Response 9
  • 10. Indicator of Compromise (IOC) • Identifies characteristics of malware  Host-based and network-based characteristics • Can be used to identify the presence of malware on a compromised host • IOCs are typically created by reversing malware • Professional responders typically have large IOC lists collected from previous intrusions they have worked • IOCs can save you time when analyzing multiple hosts  Even if you only have one IOC for one piece of malware you found • Various ”standard” languages to share indicators and threat intelligence Incident Response 10
  • 11. Standard sharing languages • Standardization is important!  Makes sharing easier  Makes working with multiple data sources easier • Different logs often refer to the same thing by different names  Logged on  Login success  Accepted password  Account Logon • Sharing between different systems within the organization • Sharing with other organizations • Need a common language to speak Incident Response 11
  • 12. CybOX • Cybox.mitre.org • Cyber Observable eXpression • Standardized schema for describing observable events  Event logging  Malware characterization  Intrusion detection  Incident response  Attack pattern characterization • Standard structure and content • …has been rolled into STIX the past few years Incident Response 12
  • 13. STIX • Stix.mitre.org • Structured Threat Information eXpression • Community driven • Standardized language to represent structured threat information • Some examples:  Malware Indicator for File Hash  File Hash Reputation  Incident Essentials – Who, What, When  Affected Asset list  Command and Control IP List Incident Response 13
  • 14. YARA • Tool used to help identify and classify malware  “Pattern matching swiss knife for malware researchers (and everyone else)” • Create descriptions based on patterns • Each rule has a set of strings and Boolean logic • Any file containing one of the three strings is reported as a silent_banker match Incident Response 14
  • 15. OpenIOC • Openioc.org • Open framework for threat intelligence sharing • Originally designed for Mandiant’s products  Has since been standardized and open sourced • IOCs are stored as XML • IOC is made up of three major parts  IOC Metadata  Author of the IOC, Name of the IOC, description, etc.  References  Investigation name, case number, comments, etc  Definition  The content of the IOC itself – artifacts, MD5 hash, registry path, etc. Incident Response 15
  • 16. OpenIOC • IOC Editor  Allows users to work with indicators in XML format  Manage the fields within the IOCs  Edit the IOCs • IOC Finder  Search for IOCs on a single host  Can be used to test new OICs  Can be used to find malware on hosts  IOC hit reporting in various formats, including HTML and text  Reports for single or multiple hosts Incident Response 16