Skip to content

Hide Navigation Hide TOC

Threat Intelligence Program - M1019 (874c0166-e407-45c2-a1d9-e4e3a6570fd8)

A Threat Intelligence Program enables organizations to proactively identify, analyze, and act on cyber threats by leveraging internal and external data sources. The program supports decision-making processes, prioritizes defenses, and improves incident response by delivering actionable intelligence tailored to the organization's risk profile and operational environment. This mitigation can be implemented through the following measures:

Establish a Threat Intelligence Team:

  • Form a dedicated team or assign responsibility to existing security personnel to collect, analyze, and act on threat intelligence.

Define Intelligence Requirements:

  • Identify the organization’s critical assets and focus intelligence gathering efforts on threats targeting these assets.

Leverage Internal and External Data Sources:

  • Collect intelligence from internal sources such as logs, incidents, and alerts. Subscribe to external threat intelligence feeds, participate in ISACs, and monitor open-source intelligence (OSINT).

Implement Tools for Automation:

  • Use threat intelligence platforms (TIPs) to automate the collection, enrichment, and dissemination of threat data.
  • Integrate threat intelligence with SIEMs to correlate IOCs with internal events.

Analyze and Act on Intelligence:

  • Use frameworks like MITRE ATT&CK to map intelligence to adversary TTPs.
  • Prioritize defensive measures, such as patching vulnerabilities or deploying IOCs, based on analyzed threats.

Share and Collaborate:

  • Share intelligence with industry peers through ISACs or threat-sharing platforms to enhance collective defense.

Evaluate and Update the Program:

  • Regularly assess the effectiveness of the threat intelligence program.
  • Update intelligence priorities and capabilities as new threats emerge.

Tools for Implementation

Threat Intelligence Platforms (TIPs):

  • OpenCTI: An open-source platform for structuring and sharing threat intelligence.
  • MISP: A threat intelligence sharing platform for sharing structured threat data.

Threat Intelligence Feeds:

  • Open Threat Exchange (OTX): Provides free access to a large repository of threat intelligence.
  • CIRCL OSINT Feed: A free source for IOCs and threat information.

Automation and Enrichment Tools:

  • TheHive: An open-source incident response platform with threat intelligence integration.
  • Yeti: A platform for managing and structuring knowledge about threats.

Analysis Frameworks:

  • MITRE ATT&CK Navigator: A tool for mapping threat intelligence to adversary behaviors.
  • Cuckoo Sandbox: Analyzes malware to extract behavioral indicators.

Community and Collaboration Tools:

  • ISAC Memberships: Join industry-specific ISACs for intelligence sharing.
  • Slack/Discord Channels: Participate in threat intelligence communities for real-time collaboration.
Cluster A Galaxy A Cluster B Galaxy B Level
Exploitation for Privilege Escalation - T1068 (b21c3b2d-02e6-45b1-980b-e69051040839) Attack Pattern Threat Intelligence Program - M1019 (874c0166-e407-45c2-a1d9-e4e3a6570fd8) Course of Action 1
Impersonation - T1656 (c9e0c59e-162e-40a4-b8b1-78fab4329ada) Attack Pattern Threat Intelligence Program - M1019 (874c0166-e407-45c2-a1d9-e4e3a6570fd8) Course of Action 1
Threat Intelligence Program - M1019 (874c0166-e407-45c2-a1d9-e4e3a6570fd8) Course of Action Exploitation of Remote Services - T1210 (9db0cf3a-a3c9-4012-8268-123b9db6fd82) Attack Pattern 1
Threat Intelligence Program - M1019 (874c0166-e407-45c2-a1d9-e4e3a6570fd8) Course of Action Exploitation for Defense Evasion - T1211 (fe926152-f431-4baf-956c-4ad3cb0bf23b) Attack Pattern 1
Threat Intelligence Program - M1019 (874c0166-e407-45c2-a1d9-e4e3a6570fd8) Course of Action Exploitation for Credential Access - T1212 (9c306d8d-cde7-4b4c-b6e8-d0bb16caca36) Attack Pattern 1