Threat Intelligence Platforms Flashcards

1
Q
A

This lesson is going to cover what Threat Intelligence Platforms (TIPs) are, why they’re used, and provide some examples of TIPs that are used in industry including; MISP, ThreatConnect, ThreatQ, Lookingglass, Insights, and Anomali. We will also talk about how threat feeds can be aggregated into Threat Intelligence Platforms, allowing organizations to create threat intelligence repositories, full of malicious indicators, and indicators of compromise.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
2
Q

What Are TIPs?

A

Threat Intelligence Platforms can be deployed as Software-as-a-Service or an on-premises solution to effectively manage a large volume of cyber threat intelligence, such as; actors, campaigns, signatures, bulletins, and Tools, Techniques, and Procedures (TTPs). TIPs are designed to provide the following functionality for security teams:

Aggregation and normalization of intelligence collected from multiple sources.
Integrate with existing security controls such as firewalls and intrusion prevention systems.
Analysis and sharing of threat intelligence.

The above diagram from Anomali clearly shows how TIPs work to collect intelligence and distribute it to security tools, such as firewalls, intrusion prevention systems, and endpoint protection controls.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
3
Q

Why Use a TIP?

A

Simply put, a Threat Intelligence Platform allows an organization to store everything related to threat intelligence in one single location. Whether it’s technical indicators of compromise or high-level awareness reports, TIPs provide a solid foundation for any cyber threat intelligence function. Anomali have defined three main groups that will benefit from the implementation of a TIP:

Security Operations Center (SOC) Teams
These teams are focused on the operational day-to-day tasks and responding to threats as they occur. A TIP provides automation for routine activities such as integrations, enrichment, and scoring.

Threat Intelligence Teams
These teams look to make predictions based on associations and contextual information between actors, campaigns, etc. A TIP provides them with a “library” of information that simplifies and streamlines this process.

Management and Executive Teams
A TIP provides management with a single platform through which to view reports at both technical and high levels. This enables them to effectively share and analyze data as incidents occur.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
4
Q

Data Aggregation

A

A Threat Intelligence Platform automatically collects and reconciles data from various sources and formats. Ingesting information from a variety of sources is a critical component of a strong security infrastructure. Supported sources and formats include:

Sources:

Open-source
3rd party paid
Government
Trusted Sharing Communities (ISACs)
Internal
Formats:

STIX/TAXII
JSON and XML
Email
.csv, .txt, PDF, Word document

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
5
Q

TIP Products

A

There are numerous Threat Intelligence Platform products in the industry. Let’s briefly take a look at some of them and their features.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
6
Q

Malware Information Sharing Platform (MISP)

A

Malware Information Sharing Platform (MISP)
Website: https://www.misp-project.org/
MISP is an open-source, community-ran project, developed and maintained by an awesome group of volunteers. MISP is used by over 6000 organizations around the world, and has been designed to be as simple as possible, making it accessible and usable. MISP offers an absolute ton of features providing extended functionality for multiple use-cases, including the ability to easily share intelligence with fellow humans, and even automated defenses.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
7
Q

ThreatConnect

A

ThreatConnect
Website: https://threatconnect.com/solution/threat-intelligence-platform/
ThreatConnect have produced their own Threat Intelligence Platform that can completely automate the intelligence collection process, regardless of the source format. Whether it’s an email, RSS feed, or blog, ThreatConnect can ingest it and store the intelligence within the TIP. ThreatConnect also provides automation in the form of runbooks, allowing human analysts to determine what actions should be taken under specific circumstances.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
8
Q

Anomali

A

Anomali
Website: https://www.anomali.com/
The TIP produced and maintained by Anomali is utilized by many different Information Sharing and Analysis Centers including the Financial Services Information Sharing and Analysis Center (FS-ISAC). Anomali offers the ability for an organization to quickly and easily create its own ISAC, allowing other organizations to partner together and share intelligence together. The website also offers an “app store” where organizations can purchase integrations and threat feeds to boost the capabilities or the TIP and other security controls utilized by the organization.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly
9
Q

ThreatQ

A

ThreatQ
Website: https://www.threatq.com/threat-intelligence-platform/
The ThreatQ platform is based on a threat-centric approach to security operations, allowing security teams to “prioritize based on threat and risk, collaborate across teams, automate actions and workflows and integrate point products into a single security infrastructure”. ThreatQ also states that it can do more than a typical TIP, and can assist with security practices such as Vulnerability Management, Spear Phishing, Incident Response, and Threat Hunting.

In the next lesson, we’re going to cover the open-source TIP, Malware Information Sharing Platform in more detail, and show you how to set up your own local instance of MISP! We have decided to use this TIP for demonstration and exercise purposes as it is relatively simple to set up, and is open-source, meaning that it is accessible for all of our BTL1 students. Having the practical ability to set up a TIP will really set you apart from other threat intelligence analysts, whether you’re already in the security industry, or trying to land your first role.

How well did you know this?
1
Not at all
2
3
4
5
Perfectly