Zeroska
  • 🐱Zeroska - The Bold
  • Computer/Cyber Security
    • ⭐Fresh off the boat - for new Blue Teamer/ SOC Analyst
    • 💀Necromancer (DFIR)
      • 🕵️DFIR and DFIR case
        • 🗃️Case Files
          • Misconfiguration 0x01
      • 📔My own DFIR notes
        • The Mark of The Web (MOTW)
        • LNK Shortcut
        • Prefetch, AmCache, ShimCache in Windows
        • Malicious Document (VBA, Office, PDF, ...)
        • SRUM (System Resource Usage Monitor)
        • Volatility notes
        • Understand Logon Session in Windows
        • "Very" Hidden sheets in Excel
        • Hidden Processes
      • 📔Notes
        • Useful Resources
        • Useful Resources DFIR
        • Saved Content (Backup for the OG content get deleted)
          • How to be best SOC analyst ever
    • 🧙‍♂️Defense Witchcraft
      • Data Analysis as a Defender
      • Active Directory
      • Windows Event Logs
        • Authentication (Windows Account Life Cycle Events)
      • MS Exchange
      • Windows
    • 💙My Current Blue Team Operation
      • VLAN Monitoring Template
      • Daily Monitoring Report
      • General Playbook
      • JupyterHub Configuration Guide
      • How to train your Blue Team
    • 🏭ICS/OT
      • Setup ICS/OT Simulation Learning Lab
      • Smart Grids
      • Learning Modbus TCP
      • Learning DNP3
      • Resources/Blogs/Links
    • 🥷Threat Intelligence
      • Small Cyber Threat Intelligence Program
      • Intelligence Analysis [VN]
      • OSINT Information Monitoring
        • Telegram Info-Stealer Monitoring
      • C2 Tracker
      • Fake Website Tracker
      • Dark Web Investigation Attempt
      • Threat Intelligence Quick Win
      • Resources/Blogs/Links
  • 😒Computer and Technology
    • My Home Lab Setup
    • 🐴ELK Stack
      • Useful Resources
      • ELK Stack - Container - Docker Compose - AWS ECS
      • ECS - Elastic Common Schema
      • Elasticsearch
      • Logstash
      • Troubleshooting and Problems
    • 🐧Linux
      • Setting up good SSH Authentication
      • Configure Auditd and how to leverage it
      • ELF Format
      • Useful Links
    • 📦Containers
      • Docker container logs is quite big
      • Worth Reading
    • 🪠Splunk Learning Experience
      • Splunk Test Lab
      • Data Collection Tier (How to get the data)
      • SC4S Custom Filter For Windows Event Log in Syslog Format (NXLog)
      • Useful Resources
  • Threat Hunting
    • Hunting for Implant
    • Using STRIDE and DREAD
    • 🐳Predators and Preys (Computing)
      • Tracks or Hunting Artifacts
    • 📦Network Packet Analysis
      • The Basic
      • Tshark | Zeek Copy & Paste
      • Network Analysis Resources
    • Grep | Powershell Search | Regex
    • Hunting Resources
  • 🎵In my remains
    • Choices
    • The Art of Facing Unknown Problems
    • Build the best DFIR team
    • Reverse Engineering - Đồ án hướng ngành A "Hụt" của tôi
Powered by GitBook
On this page
  • Overview of Cyber Threat Intelligence and CTI Requirement
  • Who defines the requirements?
  • Intelligence Direction
  • Establish a Request for an Information Portal (PFR) or Priority Intelligence Requirement (PIR)
  • Collection - Good Feeds/Tools and Connectors
  • Assets Profiling
  • Create Diamond Model
  • Refs:

Was this helpful?

  1. Computer/Cyber Security
  2. Threat Intelligence

Small Cyber Threat Intelligence Program

This is my journey to build a small Threat Intelligence Program

PreviousThreat IntelligenceNextIntelligence Analysis [VN]

Last updated 1 year ago

Was this helpful?

Overview of Cyber Threat Intelligence and CTI Requirement

Refs

When I studied and learned about CTI there was a cycle that at first I overlooked but now I realize it is very crucial to understand this cycle, which is the CTI Life Cycle

The first thing in CTI is to have a requirement

Who defines the requirements?

You try to answer a question from your employer, your C-level, or for yourself. Such questions could be vague and broad for example:

  • Is our company likely to be a target for a ransomware attack?

  • What adversaries might attack our company?

Intelligence Direction

To be sure that the most relevant and most critical information is processed and not lost into the noise.

Establish a Request for an Information Portal (PFR) or Priority Intelligence Requirement (PIR)

This can enable SOC, C-level, and customer to create an intelligence requirement request such as:

  • Trend Reports

  • Threat Profile

  • Cyber Threat Advisory

  • ...

Collection - Good Feeds/Tools and Connectors

After you have your requirement you now need to collect the data and all the telemetry, the historical and related data to the requirement.

The second step of TI is to collect data, the first step is the direction (which is not the purpose of this guide). There are 3 types of information sources:

  • Internal Source (network traffic, logs, scans)

  • Technical Source (Vul DB, Threat Feeds, OSINT) → free feed or paid free, or could be malware repository or C2 scanner

  • Human Source (Dark Web, Social Media, Forums, Cyber Security Blogs, and Feeds) → It is very hard and needs a dedicated person and training to penetrate and collect data

Some feeds require you to send them an email so that have access to their feed, create a PGP key, and send them an email

Name
Source
Type
Reliability of Source
Accuracy of Data

MISP Community Feed OSINT

Technical

MISP Commnunity Feed

CISA Known Exploited CVE

Technical

A

A

CISA ICS/OT Adversory

Technical

A

A

ICS Stuffs

AlienVault Open Threat Exchange (Need to creat acount and obtain API key)

Threat Fox

Technical

Ransomwatch

Technical

B

B

Ransomware Live

Human

APT Group and Operation

Human

B

B

Botvrj

Technical

AlienVault OTX

Technical

Abuse CH

Technical

Emerging Threats

Technical

Malpulse

Technical

Unpac me

Technical

Tools could be used to generate/find data

Assets Profiling

I read the Cuckoo's Egg and really love it, on how Cliff actually know every part of his network, I think he did a good job on Assets Management.

This will need some standardization the gather asset information

For me, I just use this spreadsheet as a template for Assets Management (IP addresses, what is its function, how critical it is)

<Insert the spreadsheet>

Create Diamond Model

Refs:

(you can use API to crawl this data)

🥷
Telegram Info-Stealer Monitoring
https://github.com/ciscocsirt/GOSINT
https://www.socinvestigation.com/threat-intelligence-diamond-model-of-intrusion-analysis/
https://www.slideshare.net/asfakian/spin-your-cti-process-round-first-cti-conference-2023
https://www.slideshare.net/asfakian/cti-training-on-intelligence-requirements
https://www.circl.lu/doc/misp/feed-osint/
https://www.cisa.gov/sites/default/files/feeds/known_exploited_vulnerabilities.json
https://threatfox.abuse.ch/downloads/misp/
https://ransomwatch.telemetry.ltd/#/recentposts
https://www.ransomware.live/#/
https://docs.google.com/spreadsheets/d/1H9_xaxQHpWaa4O_Son4Gx0YOIzlcBWMsdvePFX68EKU/edit#gid=667848006
https://www.botvrij.eu/data/feed-osint/
https://otx.alienvault.com/
https://sslbl.abuse.ch/blacklist/
https://rules.emergingthreats.net/
http://malpulse.com/
https://www.unpac.me/feed
https://www.slideshare.net/asfakian/cti-training-on-intelligence-requirements
https://www.slideshare.net/asfakian/setting-your-cti-process-in-motion
https://www.first.org/resources/papers/london2019/1430-1500-Your-Requirements-are-Not-My-Requirements-Speaker-Pasquale-Stirparo.pdf
Just a draft
Taken from Blue Team Hand Book