Advanced Security #threat-intelligence #STIX-TAXII #attribution #indicator-lifecycle

Threat Intelligence

5 exercises — master threat intelligence vocabulary: OSINT vs commercial feed evaluation (FP rate, relevance, staleness), threat actor profiling and attribution caveats ("attribution is hard"), STIX/TAXII standards for automated intel sharing, indicator lifecycle management in a TIP, and actionable vs aspirational intelligence with intel tasking.

0 / 5 completed
Threat intelligence quick reference
  • Feed quality criteria: false positive rate (high FP = alert fatigue), staleness (how fast expired indicators are removed), relevance (your industry/geography/tech), format (STIX/TAXII vs flat list).
  • Threat actor profiling components: motivation, capabilities, TTPs (the fingerprint), infrastructure preferences, victimology. "Attribution is hard" — TTP overlap ≠ identity proof; always state confidence level, not certainty.
  • STIX = data format (JSON schema for threat intel objects). TAXII = transport protocol (REST API for sharing those objects). ISAC = sector-level sharing community using both.
  • Indicator lifecycle: Fresh → Maturing → Expired → Revoked. IP addresses expire in days–weeks; domains in weeks–months; file hashes persist longer. Remove stale indicators to prevent FPs.
  • Actionable intelligence: relevant + timely + concrete next action (hunt/block/patch). Aspirational: interesting but no immediate action possible.
  • Intel tasking: formal directive to hunt, block, or detect based on a specific intel report. High-fidelity indicator: specific, current, low-FP. Threat briefing: structured presentation of findings with actionable guidance.
1 / 5

A threat intel analyst is onboarding new external threat feeds. During a team discussion, a colleague asks: "What's the difference between OSINT and commercial feeds, and why do we care about the false positive rate and feed relevance when selecting a threat feed?"

Explain the key distinctions and selection criteria for threat feeds.