Threat Intelligence
Workflow & Dissemination
๐Ÿ“‹
01
Requirements
๐Ÿ“ก
02
Collection
โš™๏ธ
03
Processing
๐Ÿ”ฌ
04
Analysis
๐Ÿ“ค
05
Dissemination
๐Ÿ”„
06
Feedback
OSINT โ€” Open Source Intelligence
SourceTypeIntelligence ValueAccessFreq
VirusTotal
virustotal.com
TechnicalFile hashes, URL/domain/IP reputation, multi-AV scanning, behaviour sandboxing, YARA rules, community commentsFree + API; EnterpriseReal-time
Shodan
shodan.io
InfraInternet-facing asset discovery, banner grabbing, CVE exposure, open ports, certificate data, honeypot detectionFree (limited); API subContinuous
Censys
censys.io
InfraInternet-wide scanning, TLS certificate inventory, ASN analysis, attack surface mappingFree (limited); EnterpriseDaily
AlienVault OTX
otx.alienvault.com
CommunityCrowdsourced IOC pulses, threat actor profiles, malware signatures, community YARA/Snort/Sigma rulesFree; APIReal-time
URLhaus / MalwareBazaar
abuse.ch
TechnicalActive malware distribution URLs, samples with tags, C2 infrastructure, botnet trackers (Feodo, SSL Blacklist)Free; APIReal-time
CIRCL CVE Search
cve.circl.lu
VulnCVE details with CVSS, CPE data, CWE classification, vendor advisories, exploit referencesFree APIDaily
Exploit-DB / GHDB
exploit-db.com
VulnPublic exploit code, PoC availability timeline, Google Hacking Database โ€” direct applicability indicator for CVE triageFreeContinuous
RiskIQ / PassiveDNS
community.riskiq.com
InfraHistorical DNS resolution, domain registration pivoting, IP-to-domain mapping over time, certificate transparencyFree community; EnterpriseContinuous
MISP Threat Sharing
misp-project.org
CommunityStructured TI sharing platform; IOCs, malware artefacts, TTP correlation. Used by CIRCL, ISACs, CERTs globallySelf-hosted / communityReal-time
GreyNoise
greynoise.io
InfraMass internet scanner vs targeted attacker classification. Reduces false positives from benign scanner IPs in SIEMFree (limited); APIContinuous
Government & National Cyber Agencies
SourceRegionIntelligence ValueSharing Format
NCSC (UK)
ncsc.gov.uk
UKThreat advisories, Malware Analysis Reports, joint advisories with CISA/NSA, PDNS, Active Cyber Defence services, Early Warning platformAdvisories, STIX/TAXII (Early Warning)
CISA (US)
cisa.gov
US / AlliedKEV catalogue (Known Exploited Vulnerabilities), joint cybersecurity advisories, ICS-CERT alerts, #StopRansomwareAdvisories, STIX/TAXII, KEV JSON feed
ENISA
enisa.europa.eu
EUAnnual Threat Landscape report, sector threat reports, NIS2 guidance, CSIRT network intelligence (limited public)Reports, advisories
NVD (NIST)
nvd.nist.gov
US / GlobalAuthoritative CVE database with CVSS v3/v4 scores, CPE/CWE data, vendor statements. Primary CVE enrichment sourceJSON feeds, API
ASD / ACSC (AU)
cyber.gov.au
AustraliaJoint advisories with Five Eyes partners, sector alerts, ransomware guidanceAdvisories
Commercial Threat Intelligence
VendorStrengthsTypical Output
Recorded FutureReal-time indexing of dark web, paste sites, forums, technical sources; risk scores; API integrationIOC feeds, actor profiles, CVE intelligence with exploitation likelihood scoring, brand monitoring
Mandiant (Google)Nation-state threat actor attribution, APT group tracking, frontline IR intelligenceAdvantage platform: IOCs, actor profiles, malware intelligence, vulnerability intelligence with weaponisation data
CrowdStrike Falcon IntelAdversary-centric intelligence; eCrime and nation-state actor tracking; TTP-focusedAdversary profiles, malware family reports, campaign reports, IOC integration via Falcon platform
Intel 471Deep and dark web collection; underground forum monitoring; initial access broker trackingActor profiles, credential leak monitoring, malware intelligence, criminal market surveillance
Digital Shadows (ReliaQuest)Digital risk protection; brand monitoring; data leak detection; attack surface managementLeaked credential alerts, brand impersonation, domain squatting, paste site monitoring
Palo Alto Unit 42Ransomware group tracking; threat actor TTPs; malware analysis; cloud threat intelligenceThreat research reports, ransomware intelligence, IOCs via AutoFocus
Team CymruBGP routing data; IP reputation; infrastructure attribution; Pure Signal platformIP/ASN threat intelligence, malware hosting attribution, C2 infrastructure mapping
ISACs & Sector Sharing
๐ŸฆFS-ISAC
Financial Services. Global financial sector TI sharing. TLP-governed IOC feeds, sector-specific threat reports, real-time alerts. Membership-based.
๐ŸฅH-ISAC
Health. Healthcare sector. Ransomware alerts targeting healthcare, medical device vulnerability intelligence, sector-specific IOCs.
โšกE-ISAC
Energy. Electric subsector TI, grid-specific IOCs, ICS/SCADA advisories, real-time incident coordination.
๐Ÿ›ก๏ธCiSP (UK)
NCSC's Cyber Information Sharing Partnership. UK-focused. TLP-governed sharing across sectors. Requires NCSC membership/vetting.
๐ŸŒMS-ISAC
Multi-State. US state/local/tribal/territorial government. CISA-supported. Free IOC feeds, malware analysis, threat advisories for public sector.
โœˆ๏ธA-ISAC
Aviation. Airline, airport, and aerospace sector TI. ATM-specific threats, physical-cyber convergence, supply chain intelligence.
Internal Sources
๐Ÿ–ฅ๏ธEDR / XDR Platform
Process telemetry, network events, file writes, memory injection attempts. Highest-fidelity internal TI. Feeds directly back into threat hunting and detection refinement.
๐Ÿ“ŠSIEM & UEBA
Aggregated log intelligence, anomaly baselines, user behaviour deviations, insider threat signals. Alert data informs what external intelligence to prioritise.
๐ŸฏHoneypots / Deception
Internal honeytokens, honeypot systems, decoy credentials. Lateral movement detection; near-zero false positives. Excellent TTPs signal.
๐Ÿ”DFIR Investigations
Post-incident forensic findings: new TTPs, novel persistence mechanisms, previously unknown infrastructure. Every investigation produces net-new intelligence.
๐Ÿ“งPhishing Submissions
User-reported phishing emails. First-party intelligence on active campaigns targeting the organisation. Sender infrastructure, lures, payload URLs.
๐Ÿ”Vulnerability Scans
Authenticated internal scans (Qualys, Tenable, Rapid7). Combined with NVD/CISA KEV data drives evidence-based patch prioritisation.
Intelligence Type Matrix
๐ŸŽฏ
Technical IOCs
Tactical
  • File hashes (MD5, SHA-1, SHA-256, imphash, TLSH)
  • IPv4/IPv6 addresses and CIDR ranges
  • Domain names and subdomains
  • URLs and URI patterns
  • Email addresses and sender infrastructure
  • Mutexes, registry keys, named pipes
  • YARA rules, Sigma rules, Snort/Suricata rules
  • JA3/JA3S TLS fingerprints
  • User-agent strings, HTTP headers
  • X.509 certificate hashes and serial numbers
โš ๏ธ
Vulnerability Intelligence
Operational
  • CVE details with CVSS v3.1 / v4.0 base scores
  • EPSS scores (Exploit Prediction Scoring System)
  • CISA KEV (Known Exploited Vulnerabilities) status
  • PoC / exploit availability and maturity
  • Zero-day tracking and vendor patch timelines
  • Affected product/version CPE data
  • Patch availability and workaround status
  • Active exploitation in the wild evidence
  • Ransomware / eCrime exploitation association
  • VEX (Vulnerability Exploitability eXchange) data
๐ŸŒ
Infrastructure Intelligence
Operational
  • Domain registration data (WHOIS, registrar, creation date)
  • Passive DNS historical resolution data
  • BGP routing and ASN attribution
  • IP geolocation and hosting provider attribution
  • Certificate Transparency Log monitoring
  • Newly registered domains (NRD) monitoring
  • Fast-flux and bulletproof hosting patterns
  • Domain squatting / typosquat detection
  • Shared hosting / infrastructure clustering
  • C2 framework fingerprinting (Cobalt Strike, Sliver)
๐ŸŽญ
Threat Actor Intelligence
Strategic
  • Threat actor profiles and attribution confidence
  • Motivation: espionage, financial, hacktivism, destructive
  • Targeting: sector, geography, victim profile
  • TTPs mapped to MITRE ATT&CK
  • Infrastructure patterns and reuse
  • Campaign tracking and temporal patterns
  • Toolset: known malware families and custom tools
  • Initial access broker relationships
  • RaaS affiliate structure intelligence
  • Leadership / persona attribution (where attributable)
๐Ÿ“ง
Email & Phishing Intelligence
Operational
  • Phishing kit fingerprints and infrastructure
  • DMARC/DKIM/SPF abuse and spoofing patterns
  • Lookalike domain registration monitoring
  • Business email compromise (BEC) lure patterns
  • Malicious attachment hashes and document macros
  • Phishing-as-a-service (PhaaS) platform tracking
  • Credential harvesting page infrastructure
  • QR code phishing (quishing) lure analysis
  • EvilProxy / AiTM phishing proxy detection
  • Callback phishing / vishing campaign patterns
๐Ÿ”’
Credential & Exposure Intel
Operational
  • Dark web credential dump monitoring
  • Stealer log data (Redline, Vidar, Raccoon)
  • Paste site credential exposure
  • Initial access broker listings (org-specific)
  • Data leak site monitoring (ransomware groups)
  • Brand impersonation on dark web forums
  • Access listings (RDP, VPN, webshell sales)
  • Sensitive document exposure monitoring
  • Corporate email appearance in combolists
  • HIBP API integration for employee exposure
๐Ÿ›๏ธ
Strategic Intelligence
Strategic
  • Geopolitical context and threat actor motivations
  • Nation-state campaign targeting patterns
  • Sector-level threat landscape assessments
  • Regulatory environment changes affecting risk
  • Hacktivist movement tracking and targeting
  • Critical event calendars (elections, sanctions)
  • Supply chain / third-party risk intelligence
  • Industry incident reporting and trends
  • Insurance market signals (ransomware frequency)
  • Board / executive threat briefing materials
๐Ÿญ
OT / ICS Intelligence
Operational
  • ICS/SCADA-specific CVE and advisory tracking
  • PLC/HMI firmware vulnerability monitoring
  • Nation-state OT campaign intelligence
  • Dragos WorldView / Claroty CTR reporting
  • CISA ICS-CERT advisories
  • IT-OT boundary threat patterns
  • Critical infrastructure targeting intelligence
  • Safety system (SIS) threat intelligence
  • Industrial protocol exploitation (Modbus, DNP3)
  • Living-off-the-land in OT environments
Vulnerability Prioritisation โ€” Scoring Framework

Combining CVSS, EPSS, and contextual factors to prioritise remediation. CVSS alone is insufficient โ€” EPSS exploitation likelihood and CISA KEV status are critical additional signals.

FactorSourceWeight / UseThreshold / Action
CVSS v3.1 Base ScoreNVD / vendorBaseline severity. Use as initial filter only โ€” not as sole prioritisation signal.Critical โ‰ฅ9.0 ยท High 7.0โ€“8.9 ยท Medium 4.0โ€“6.9
EPSS ScoreFIRST.orgProbability of exploitation in next 30 days. Updated daily. High EPSS + High CVSS = immediate priority.>10% = elevated priority ยท >50% = critical action
CISA KEV StatusCISA KEV catalogueConfirmed exploitation in the wild. KEV listing overrides scoring โ€” patch immediately.KEV = 24โ€“72hr patch target internet-facing; 7 days internal
PoC / Exploit AvailabilityExploit-DB, GitHub, TI platformsPublic PoC dramatically increases exploitation likelihood. Elevates priority independently of CVSS.Public weaponised exploit = treat as KEV until confirmed otherwise
Asset ExposureInternal CMDB / scan dataInternet-facing assets with the vulnerability are higher priority than internal-only.Internet-facing: highest priority ยท Crown-jewel system: immediate escalation
Threat Actor AssociationTI platform / advisoriesIs this CVE being actively exploited by actors targeting your sector or geography?Sector-targeted exploitation = immediate escalation regardless of other scores
Compensating ControlsInternal assessmentWAF, network segmentation, authentication controls may reduce exploitability. Adjust effective priority.Documented compensating control signed by CISO can extend SLA by up to 50%
Intelligence Feed Targets
๐Ÿ”
SIEM โ€” Detection Rules
Automated
Ingests: IOCs, Sigma rules, YARA rules, attack pattern indicators
Output: New detection rules, IOC correlation alerts, hunt queries
SLA: Critical IOCs <1hr; vetted rules <24hr
Owner: Detection Engineering / SOC
๐Ÿ›ก๏ธ
EDR โ€” IOC Feeds
Automated
Ingests: File hashes, process names, registry keys, C2 IPs/domains, YARA rules
Output: Endpoint block/alert actions, real-time threat hunting
SLA: High-confidence IOCs <2hr via API integration
๐Ÿ”ฅ
Firewall / Proxy Blocklists
Automated
Ingests: Malicious IPs, domains, URLs, ASNs, geo-blocks
Output: Network-layer blocking, proxy category updates
SLA: Critical C2 IPs <1hr
Caution: Validate before bulk push โ€” FP risk
๐Ÿ”
Email Security Gateway
Hybrid
Ingests: Sender IPs, phishing domains, attachment hashes, URL patterns, DMARC signals
Output: Block/quarantine/tag rules, sandbox triggers
SLA: Active phishing IOCs <1hr
๐Ÿฉน
Vulnerability Management
Hybrid
Ingests: CVE details, CVSS, EPSS, CISA KEV, PoC availability, threat actor association
Output: Prioritised patch schedule, emergency patch tickets, compensating control decisions
๐ŸŽฏ
Threat Hunting
Analyst
Ingests: New TTPs, actor profiles, infrastructure patterns, anomaly baselines
Output: Hunt packages (hypotheses + queries), new detections, IOC refinement
Cadence: Weekly + ad-hoc on new TI
๐Ÿ“Š
Executive / Board Briefing
Analyst
Ingests: Strategic threat landscape, sector-targeting trends, major incidents, regulatory TI
Output: Monthly threat brief, ad-hoc for significant events
Format: Non-technical narrative; business impact framing
๐Ÿค
Sector / Regulatory Sharing
Governed
Shares to: NCSC, ISAC, CiSP, sector peers, CERT/CC
Format: STIX 2.1, TAXII 2.1, TLP-governed advisories, MISP events
Governance: Legal review required for cross-org sharing
๐Ÿ›’
Third-Party / Procurement
Analyst
Ingests: Supplier compromise intelligence, supply chain campaign targeting
Output: Supplier security alerts, contract review triggers, emergency notifications
๐Ÿ“‹
SOC Playbook Updates
Hybrid
Ingests: New malware TTPs, actor behaviour patterns, novel attack chains
Output: Updated triage playbooks, new runbooks, analyst training notes
Cadence: Monthly review; immediate for novel significant TTPs
๐Ÿ—๏ธ
Architecture & Red Team
Analyst
Ingests: Attack surface intelligence, LOLBin evolution, novel exploitation chains
Output: Control gap identification, red team briefs, purple team exercises, hardening recommendations
๐Ÿท๏ธ
Brand & Digital Risk
Automated
Ingests: Lookalike domain registrations, brand impersonation on dark web, credential exposure, social media impersonation
Output: Takedown requests, monitoring alerts
Intelligence Report Types
Report TypeAudienceCadenceTLPContent
Flash ReportSOC, IR, Detection EngAd-hoc (<2hrs)TLP:RED/AMBERBreaking threat with immediate action required. Single-page max. IOCs, affected systems, immediate mitigations.
Daily Threat DigestSOC, TI, Security LeadershipDailyTLP:AMBERCurated summary of overnight alerts, new CVEs, active campaigns, notable IOCs. 1โ€“2 pages.
Malware / Campaign ReportSOC, Detection Eng, Threat HuntersAd-hocTLP:AMBERDeep-dive analysis of a specific malware family or campaign. IOCs, TTPs, hunt queries, detection logic.
Actor ProfileSOC, CISO, IR, Red TeamQuarterly / on changeTLP:AMBERThreat actor profile: motivation, TTPs, targeting, infrastructure, historical campaigns, defensive recommendations.
Executive Threat BriefCISO, Board, CLOMonthlyTLP:GREENNon-technical strategic brief. Business risk framing. Sector threat landscape. No IOCs. 2โ€“3 pages max.
CVE / Vuln AdvisoryVuln Mgmt, IT Ops, CISOAd-hocTLP:AMBERSpecific CVE advisory with internal applicability assessment, EPSS/KEV context, patch/workaround guidance, SLA.
Threat Landscape AssessmentBoard, CISO, RiskAnnualTLP:GREENAnnual strategic threat assessment. Risk register input. Sector benchmarking. Investment recommendations.
Email Authentication Protocols
๐Ÿ”’SPF
Sender Policy Framework. DNS TXT record defining which IP addresses are authorised to send email for a domain. Receiver checks sending server IP against SPF record at envelope evaluation.
RFC 7208IP-basedDNS TXT
โœ๏ธDKIM
DomainKeys Identified Mail. Cryptographic signature applied to outbound email headers and body. Receiver validates against public key in sender DNS. Proves message was not modified in transit.
RFC 6376CryptographicContent integrity
๐Ÿ“‹DMARC
Domain-based Message Authentication. Policy layer on SPF and DKIM. Specifies handling for failing messages (none/quarantine/reject) and where to send aggregate (RUA) and forensic (RUF) reports.
RFC 7489Policy + ReportingAlignment
DMARC Deployment Lifecycle
DMARC as an Intelligence Source
๐Ÿ“ฉAggregate Reports (RUA)
Daily XML reports from receiving mail servers: sending IPs, volumes, SPF/DKIM pass/fail, disposition. Intelligence value: identify spoofing attempts, misconfigured senders, shadow IT email streams, and mail volume anomalies.
Spoofing detectionXML / Daily
๐Ÿ”Forensic Reports (RUF)
Per-message failure reports including full message headers for emails that fail DMARC. Intelligence value: phishing lure analysis, attacker infrastructure identification, spoofed sender patterns.
Phishing analysisPer-message
๐ŸŒLookalike Domain Monitoring
Monitor Certificate Transparency logs and domain registration feeds for lookalike registrations (typosquats, homoglyphs, combosquats). Correlate with DMARC failure reports to identify active impersonation campaigns.
Brand protectionProactive
๐Ÿ“ŠBIMI
Brand Indicators for Message Identification. Requires DMARC at p=quarantine/reject. Displays verified brand logo in supporting mail clients. Signals authentication maturity and deters impersonation at scale.
Brand trustVMC required
Broader Email Security Intelligence Areas
AreaIntelligence SignalsTooling / SourcesFeed Target
Header AnalysisReceived chain anomalies, X-Originating-IP, authentication-results header, Reply-To mismatch, envelope From โ‰  header FromMXToolbox, Mail Header Analyser, email gateway logsSOC triage, phishing response playbooks
MX / Mail Infrastructure ReconMX record changes (possible hijack), mail server fingerprinting, open relay detection, SMTP STARTTLS enforcement statusMXToolbox, DNSlytics, nmapVulnerability management, infrastructure monitoring
Phishing Kit IntelligenceKit source code patterns, hosting provider patterns, certificate reuse, phishing page HTML fingerprints, credential exfil destination analysisPhishTank, OpenPhish, FortiGuard, manual analysisEmail gateway rules, proxy blocklists
BEC Pattern AnalysisDisplay name spoofing patterns, CEO/CFO impersonation lures, vendor impersonation (invoice fraud), urgency and wire transfer language patternsEmail gateway logs, user-reported phishing, DMARC RUFEmail gateway rules, user awareness training
AiTM / EvilProxy DetectionAdversary-in-the-Middle phishing proxy indicators: cookie theft after MFA, unusual token reuse, logon from unexpected IP post-MFAEntra ID sign-in logs, Defender for Identity, UEBASOC detection rules, identity security
Quishing (QR Phishing)QR code payloads in email bodies/attachments, URL extraction from QR images, sandbox detonation of QR-delivered URLsEmail sandbox, computer vision tooling, URL detonationEmail gateway (QR scanning), user awareness
Credential Dump MonitoringCorporate email addresses in leaked credential dumps, stealer log data with email credentials, combo list appearanceHIBP, Intel 471, Flare, Digital ShadowsIdentity security, forced resets, SOC alerting
Malicious Attachment IntelDocument-based malware (macro, template injection, HTML smuggling), archive-based delivery, LNK/ISO container abuseVirusTotal, MalwareBazaar, ANY.RUN, Tria.ge sandboxEmail gateway (file type blocking), EDR rules
TLP:RED
Strictly Restricted
Not for disclosure. Restricted to recipients only โ€” not to be forwarded, stored in shared systems, or discussed beyond named individuals in the conversation.
Use when: information could damage the source, ongoing operations, or specific individuals if shared beyond direct recipients.

Examples: active law enforcement operations, named victim details before public disclosure.
TLP:AMBER
Limited Distribution
Restricted to the recipient organisation and their clients on a need-to-know basis. Cannot be shared publicly or with other organisations without explicit permission.
TLP:AMBER+STRICT = organisation only, not to clients/third parties.

Use when: information could harm the source or recipient's operations if shared beyond the immediate community.
TLP:GREEN
Community Sharing
Can be shared within the community (sector, ISAC, peer group). Not to be shared publicly or posted to internet-accessible resources.
Use when: information is useful for the community but could harm the source if made fully public.

Examples: sector-specific IOC feeds, ISAC advisories, CERT bulletins within closed communities.
TLP:WHITE
Unrestricted
No restriction on disclosure. Can be shared publicly without restriction. Subject to standard copyright rules.
Use when: information carries minimal risk of misuse and can freely circulate.

Examples: NCSC public advisories, CVE descriptions, published threat research, public YARA rules.
TLP Handling in Practice
ScenarioTLPHandling Requirement
Active phishing campaign targeting your org โ€” shared by NCSC Early WarningTLP:AMBERShare internally with SOC and email team. Do not publish IOCs publicly or share with other organisations without NCSC permission.
Zero-day PoC shared by a peer in a closed ISAC community callTLP:REDShare only with named participants. Do not log in shared systems. Cannot be quoted or referenced outside the call.
CISA KEV listing for a new actively exploited CVETLP:WHITENo restrictions. Share freely. Use in public-facing comms, vendor advisories, blog posts.
Dark web intelligence indicating org credentials for sale โ€” sourced from commercial TI vendorTLP:AMBER+STRICTOrganisation only โ€” HR, CISO, Legal, Identity team. Not to clients, partners, or public.
ISAC sector threat bulletin โ€” distributed to ISAC membersTLP:GREENShare within your sector community and ISAC members. Do not post to public forums, social media, or websites.
YARA rule derived from malware analysis, no attribution to sensitive sourceTLP:WHITECan be published on GitHub, shared via OTX, or submitted to VirusTotal. Community sharing encouraged.
STIX 2.1 / TAXII 2.1 โ€” Structured Sharing
๐Ÿ”—STIX 2.1 Objects
Core SDO types:

attack-pattern โ†’ MITRE ATT&CK techniques
campaign โ†’ Threat campaigns
indicator โ†’ IOCs with pattern language
malware โ†’ Malware family descriptions
threat-actor โ†’ Group profiles
vulnerability โ†’ CVE references
course-of-action โ†’ Mitigations
๐Ÿ“กTAXII 2.1 Transport
REST API for STIX bundle exchange.

Collections โ†’ Named groups of STIX content
Authentication โ†’ API key, OAuth 2.0, certificate

Compatible: MISP, OpenCTI, ThreatQ, Recorded Future, MITRE ATT&CK TAXII server
๐Ÿ”„MISP Integration
MISP supports STIX import/export and native TAXII server integration.

โ€ข Ingest ISAC feeds
โ€ข Share events with sector peers
โ€ข TLP marking on all objects
โ€ข Automated IOC push to SIEM/EDR via sync
โ€ข Correlation across feeds to reduce duplicates
IOC Triage & Validation Workflow
1
Ingest & Deduplication
New intelligence arrives from feeds, advisories, ISAC, internal systems. Normalise to common format (STIX or internal schema). Deduplicate against existing IOC database โ€” avoid alert fatigue from reprocessing known indicators. Volume control is critical: a 100,000-IOC SIEM rule set degrades performance.
Output: normalised IOC setSLA: automated <15min
2
Source Reliability Assessment
Assess source reliability and information credibility independently using an Admiralty Scale or equivalent โ€” Source (Aโ€“F) ร— Information (1โ€“6). High-volume automated feeds require statistical false-positive analysis before deployment. Government/CERT sources default to high reliability; community feeds require validation.
Output: reliability score per indicator
3
Context Enrichment
Enrich indicators with additional context: VirusTotal reputation, passive DNS history, WHOIS data, ASN/geolocation, related malware families, associated threat actors, MITRE ATT&CK mapping. Context transforms a raw IP address into an indicator with operational value โ€” know what you're blocking and why.
Output: enriched indicatorTools: VT API, Shodan, PassiveDNS
4
Relevance Assessment
Determine relevance to your organisation: Does this threat actor target your sector? Is the affected product in your environment? Is the campaign geographically relevant? Low-relevance indicators may be ingested at lower priority with monitoring-only disposition rather than blocking rules.
High / Medium / Low / Not applicable
5
Confidence Scoring
Assign confidence level based on: source reliability, corroboration from multiple independent sources, recency, and specificity. High-confidence + high-relevance = candidate for automated blocking. Low-confidence = alert-only until validated. Track confidence decay โ€” old IOCs lose value and become false-positive risk.
High / Medium / LowTTL: set expiry on all IOCs
6
Disposition & Action
Assign disposition: Block (automated, high-confidence) โ†’ EDR/FW/Proxy. Alert (monitoring, medium) โ†’ SIEM rule. Hunt (new TTP) โ†’ Threat hunting package. Watch (lower priority) โ†’ periodic review. Archive (low relevance) โ†’ retain for future correlation only.
Block โ†’ EDR/FW/ProxyAlert โ†’ SIEMHunt โ†’ TH package
7
Lifecycle Management & Expiry
IOCs have a shelf life. C2 IPs may be repurposed as legitimate infrastructure within weeks. Set TTL for all indicators: IPs (7โ€“30 days), domains (30โ€“90 days), file hashes (indefinite for known malware families). Automated expiry prevents false positives from stale intelligence degrading detection quality.
IPs: 7โ€“30d ยท Domains: 30โ€“90d ยท Hashes: indefinite
Intelligence Priority Matrix
P1 โ€” IMMEDIATE (<2 hours)
Active exploitation of your infrastructure
Credentials for sale on dark web (your org)
Zero-day in production software, no patch
Active phishing campaign targeting your users
Ransomware precursor IOCs detected internally
NCSC / CISA emergency alert โ€” sector-specific
P2 โ€” URGENT (<24 hours)
CISA KEV addition affecting your software
New PoC for Critical CVE in your environment
EPSS >50% on unpatched vulnerability
Threat actor actively targeting your sector
Supply chain compromise of a key vendor
Major peer breach โ€” similar architecture
P3 โ€” ELEVATED (2โ€“7 days)
High CVSS + EPSS 10โ€“50% โ€” assess exposure
New threat actor TTPs โ€” update detections
Sector ISAC advisory โ€” non-immediate
New malware family โ€” YARA/hunt package
Infrastructure changes in known threat actor
DMARC failure spike โ€” investigate spoofing
P4 โ€” ROUTINE (Weekly cycle)
Monthly patch cycle CVE assessment
Threat landscape report review
IOC feed refresh and expiry management
Threat actor profile updates
Vendor security advisory review
Executive briefing preparation
Zero-Day Intelligence Workflow
โšก
Zero-Day Detection & Initial Triage
โ–ถ
  • Verify the zero-day claim โ€” distinguish between "unpatched CVE" and a genuinely novel vulnerability with no vendor acknowledgement
  • Identify the vulnerable product and version range โ€” cross-reference with internal CMDB/asset inventory immediately
  • Assess exploitation complexity and pre-requisites (authentication required? network access? user interaction?)
  • Determine: is there evidence of active exploitation in the wild? (Threat actor use, CISA/NCSC advisory, incident reports)
  • Assess internet exposure of affected assets โ€” internet-facing = highest immediate priority
  • Check vendor advisory status โ€” has the vendor acknowledged? Is there a patch timeline?
๐Ÿ›ก๏ธ
Compensating Controls โ€” While Awaiting Patch
โ–ถ
  • Deploy WAF rule / IPS signature if available (vendor or community-supplied)
  • Network segment / isolate affected systems where operational impact allows
  • Restrict network access to affected service to known-good IPs / VPN-only where possible
  • Enable enhanced logging on affected systems โ€” prepare detection if exploit is attempted
  • Create SIEM detection rule for known exploit indicators or anomalous behaviour patterns
  • Disable unnecessary features / components of vulnerable software that expand attack surface
  • Document compensating controls formally with CISO sign-off and review date
๐Ÿ“ค
Dissemination & Escalation Actions
โ–ถ
  • Issue internal Flash Report to SOC, vulnerability management, and affected system owners within 2 hours
  • Escalate to CISO if: internet-facing, no patch, active exploitation, crown-jewel system affected
  • Notify IT Ops / patch management with SLA requirement and compensating control guidance
  • Share with ISAC / sector peers at appropriate TLP if intelligence suggests broad targeting
  • Report to NCSC Early Warning or equivalent if significant and novel
  • Track vendor patch release โ€” trigger emergency change as soon as patch is available and validated
  • Post-patch: validate, update intelligence record, produce lessons-learned note for TI programme review
Intelligence Programme Metrics
MetricWhat It MeasuresTarget
MTTD โ€” TI-DrivenTime from threat actor activity to TI-informed detection โ€” measures intelligence lead time over traditional alertingTI-informed detection <24hrs before SOC alert
IOC Hit RatePercentage of deployed IOCs generating at least one alert โ€” measures intelligence relevance and quality>5% hit rate; low rate = poor source quality
False Positive RatePercentage of IOC-generated alerts that are false positives โ€” measures operational impact on SOC<10% FP on blocking rules; higher acceptable on alert-only
Mean Time to OperationaliseTime from intelligence receipt to deployed detection/blocking rule โ€” measures analyst efficiencyP1: <2hrs ยท P2: <24hrs ยท P3: <7 days
Requirements CoveragePercentage of PIRs addressed by current intelligence programme>80% coverage; gaps drive source acquisition
IOC Expiry CompliancePercentage of IOCs with defined TTL and active expiry management โ€” prevents stale FP risk100% of deployed IOCs with assigned TTL