Threat intelligence is evidence-based knowledge about existing or potential threats that includes context, mechanisms, indicators, consequences, actionable recommendations and can be used to make response decisions.

Gartner, McMillan (2013) from Tactics, Techniques and Procedures (TTPs) to Augment Cyber Threat Intelligence (CTI): A Comprehensive Study

What Is Threat Intelligence Used For?

Today, most organizations focus their efforts only on the installation of technical security tools, such as IPS / IDS, ME, SIEM, but do not fully use the collected data for analytics.

The Analytical Threat Intelligence Life Cycle

3 Levels of Threat Intelligence

  1. Tactical intelligence

Goal: To gain a broader understanding of threats.

Tactical intelligence is short-term, technical in nature, and identifies simple indicators of compromise (IOC - Indicators Of Compromise).

IOC: IP addresses, URLs, hashes, domains, filename/path, registry value, usernames, e-mail addresses.

Questions to ask:

  1. Operational intelligence

Goal: Track active APT factions to better understand the opponents behind the attacks.

Behind every attack are questions:

Tactics, Techniques, and Procedures (TTPs) - The goal is to define behaviors that can be used to protect against certain strategies and threat vectors used by attackers.

Operational intelligence requires human analysis of information. Operational intelligence requires more resources than tactical intelligence but has a longer lifespan because attackers cannot quickly change their TTPs.

  1. Strategic intelligence

Attackers don't operate in a vacuum - there are almost always higher-level factors in place to carry out cyberattacks. For example, nation-state attacks are usually tied to geopolitical conditions.

Strategic intelligence shows how global events, foreign policy, and other long-term local and international movements can potentially affect an organization's information security.

How to Incorporate Data from Threat Intelligence