Threat Intelligence
5 exercises — master threat intelligence vocabulary: OSINT vs commercial feed evaluation (FP rate, relevance, staleness), threat actor profiling and attribution caveats ("attribution is hard"), STIX/TAXII standards for automated intel sharing, indicator lifecycle management in a TIP, and actionable vs aspirational intelligence with intel tasking.
0 / 5 completed
Threat intelligence quick reference
- Feed quality criteria: false positive rate (high FP = alert fatigue), staleness (how fast expired indicators are removed), relevance (your industry/geography/tech), format (STIX/TAXII vs flat list).
- Threat actor profiling components: motivation, capabilities, TTPs (the fingerprint), infrastructure preferences, victimology. "Attribution is hard" — TTP overlap ≠ identity proof; always state confidence level, not certainty.
- STIX = data format (JSON schema for threat intel objects). TAXII = transport protocol (REST API for sharing those objects). ISAC = sector-level sharing community using both.
- Indicator lifecycle: Fresh → Maturing → Expired → Revoked. IP addresses expire in days–weeks; domains in weeks–months; file hashes persist longer. Remove stale indicators to prevent FPs.
- Actionable intelligence: relevant + timely + concrete next action (hunt/block/patch). Aspirational: interesting but no immediate action possible.
- Intel tasking: formal directive to hunt, block, or detect based on a specific intel report. High-fidelity indicator: specific, current, low-FP. Threat briefing: structured presentation of findings with actionable guidance.
1 / 5
A threat intel analyst is onboarding new external threat feeds. During a team discussion, a colleague asks: "What's the difference between OSINT and commercial feeds, and why do we care about the false positive rate and feed relevance when selecting a threat feed?"
Explain the key distinctions and selection criteria for threat feeds.
Feed selection is a risk management exercise. Ingesting every available feed without quality control creates alert fatigue and operational overhead that outweighs the security benefit.
Threat feed evaluation dimensions:
Practical phrases:
• "We evaluated three commercial feeds. Feed A has a 2% FP rate and strong financial sector coverage — we selected it."
• "The OSINT feed from AlienVault OTX is useful for broadening coverage but we run all indicators through an FP filter before ingesting into the SIEM."
Key vocabulary:
• OSINT (Open Source Intelligence) — threat intelligence gathered from publicly available sources; free; broad coverage; variable quality
• Commercial threat feed — curated threat intelligence from a vendor subscription; active analyst curation; typically higher quality, higher cost
• False positive rate (feed) — the proportion of a feed's indicators that are benign in practice; high FP rate → alert fatigue and blocking of legitimate traffic
• Feed relevance scoring — a method for evaluating how closely a threat feed's coverage matches an organisation's specific industry, geography, and technology threats
Threat feed evaluation dimensions:
| Criterion | What to assess | Impact if poor |
|---|---|---|
| False positive rate | % of feed indicators that are benign; test against your environment's known-good traffic | High FP rate → alert fatigue; may block legitimate services |
| Staleness / freshness | How quickly expired indicators are removed from the feed | Stale indicators block legitimate re-used IPs; reduce detection accuracy |
| Relevance | Alignment with your industry, geography, and technology stack | Low-relevance feed generates noise from threats that will never target you |
| Format | Structured (STIX/TAXII) vs flat list (CSV, TXT); integration effort | Unstructured feeds require manual processing; automation difficult |
| Attribution depth | Does it identify actor, campaign, and TTPs, or just raw IOCs? | IOC-only feeds don't enable strategic prioritisation |
Practical phrases:
• "We evaluated three commercial feeds. Feed A has a 2% FP rate and strong financial sector coverage — we selected it."
• "The OSINT feed from AlienVault OTX is useful for broadening coverage but we run all indicators through an FP filter before ingesting into the SIEM."
Key vocabulary:
• OSINT (Open Source Intelligence) — threat intelligence gathered from publicly available sources; free; broad coverage; variable quality
• Commercial threat feed — curated threat intelligence from a vendor subscription; active analyst curation; typically higher quality, higher cost
• False positive rate (feed) — the proportion of a feed's indicators that are benign in practice; high FP rate → alert fatigue and blocking of legitimate traffic
• Feed relevance scoring — a method for evaluating how closely a threat feed's coverage matches an organisation's specific industry, geography, and technology threats
Next up: SOAR & Playbooks →