Intelligence Lifecycle
End-to-end process from requirements through collection, analysis, dissemination, and feedback
Collection Sources
Open source, government, commercial, community, and internal intelligence feeds
| Source | Type | Intelligence Value | Access | Freq |
|---|---|---|---|---|
| VirusTotal virustotal.com | Technical | File hashes, URL/domain/IP reputation, multi-AV scanning, behaviour sandboxing, YARA rules, community comments | Free + API; Enterprise | Real-time |
| Shodan shodan.io | Infra | Internet-facing asset discovery, banner grabbing, CVE exposure, open ports, certificate data, honeypot detection | Free (limited); API sub | Continuous |
| Censys censys.io | Infra | Internet-wide scanning, TLS certificate inventory, ASN analysis, attack surface mapping | Free (limited); Enterprise | Daily |
| AlienVault OTX otx.alienvault.com | Community | Crowdsourced IOC pulses, threat actor profiles, malware signatures, community YARA/Snort/Sigma rules | Free; API | Real-time |
| URLhaus / MalwareBazaar abuse.ch | Technical | Active malware distribution URLs, samples with tags, C2 infrastructure, botnet trackers (Feodo, SSL Blacklist) | Free; API | Real-time |
| CIRCL CVE Search cve.circl.lu | Vuln | CVE details with CVSS, CPE data, CWE classification, vendor advisories, exploit references | Free API | Daily |
| Exploit-DB / GHDB exploit-db.com | Vuln | Public exploit code, PoC availability timeline, Google Hacking Database โ direct applicability indicator for CVE triage | Free | Continuous |
| RiskIQ / PassiveDNS community.riskiq.com | Infra | Historical DNS resolution, domain registration pivoting, IP-to-domain mapping over time, certificate transparency | Free community; Enterprise | Continuous |
| MISP Threat Sharing misp-project.org | Community | Structured TI sharing platform; IOCs, malware artefacts, TTP correlation. Used by CIRCL, ISACs, CERTs globally | Self-hosted / community | Real-time |
| GreyNoise greynoise.io | Infra | Mass internet scanner vs targeted attacker classification. Reduces false positives from benign scanner IPs in SIEM | Free (limited); API | Continuous |
| Source | Region | Intelligence Value | Sharing Format |
|---|---|---|---|
| NCSC (UK) ncsc.gov.uk | UK | Threat advisories, Malware Analysis Reports, joint advisories with CISA/NSA, PDNS, Active Cyber Defence services, Early Warning platform | Advisories, STIX/TAXII (Early Warning) |
| CISA (US) cisa.gov | US / Allied | KEV catalogue (Known Exploited Vulnerabilities), joint cybersecurity advisories, ICS-CERT alerts, #StopRansomware | Advisories, STIX/TAXII, KEV JSON feed |
| ENISA enisa.europa.eu | EU | Annual Threat Landscape report, sector threat reports, NIS2 guidance, CSIRT network intelligence (limited public) | Reports, advisories |
| NVD (NIST) nvd.nist.gov | US / Global | Authoritative CVE database with CVSS v3/v4 scores, CPE/CWE data, vendor statements. Primary CVE enrichment source | JSON feeds, API |
| ASD / ACSC (AU) cyber.gov.au | Australia | Joint advisories with Five Eyes partners, sector alerts, ransomware guidance | Advisories |
| Vendor | Strengths | Typical Output |
|---|---|---|
| Recorded Future | Real-time indexing of dark web, paste sites, forums, technical sources; risk scores; API integration | IOC feeds, actor profiles, CVE intelligence with exploitation likelihood scoring, brand monitoring |
| Mandiant (Google) | Nation-state threat actor attribution, APT group tracking, frontline IR intelligence | Advantage platform: IOCs, actor profiles, malware intelligence, vulnerability intelligence with weaponisation data |
| CrowdStrike Falcon Intel | Adversary-centric intelligence; eCrime and nation-state actor tracking; TTP-focused | Adversary profiles, malware family reports, campaign reports, IOC integration via Falcon platform |
| Intel 471 | Deep and dark web collection; underground forum monitoring; initial access broker tracking | Actor profiles, credential leak monitoring, malware intelligence, criminal market surveillance |
| Digital Shadows (ReliaQuest) | Digital risk protection; brand monitoring; data leak detection; attack surface management | Leaked credential alerts, brand impersonation, domain squatting, paste site monitoring |
| Palo Alto Unit 42 | Ransomware group tracking; threat actor TTPs; malware analysis; cloud threat intelligence | Threat research reports, ransomware intelligence, IOCs via AutoFocus |
| Team Cymru | BGP routing data; IP reputation; infrastructure attribution; Pure Signal platform | IP/ASN threat intelligence, malware hosting attribution, C2 infrastructure mapping |
Intelligence Types
Categories of intelligence beyond IOCs โ CVEs, zero-days, domain registration, infrastructure, email, credentials, and strategic
- File hashes (MD5, SHA-1, SHA-256, imphash, TLSH)
- IPv4/IPv6 addresses and CIDR ranges
- Domain names and subdomains
- URLs and URI patterns
- Email addresses and sender infrastructure
- Mutexes, registry keys, named pipes
- YARA rules, Sigma rules, Snort/Suricata rules
- JA3/JA3S TLS fingerprints
- User-agent strings, HTTP headers
- X.509 certificate hashes and serial numbers
- CVE details with CVSS v3.1 / v4.0 base scores
- EPSS scores (Exploit Prediction Scoring System)
- CISA KEV (Known Exploited Vulnerabilities) status
- PoC / exploit availability and maturity
- Zero-day tracking and vendor patch timelines
- Affected product/version CPE data
- Patch availability and workaround status
- Active exploitation in the wild evidence
- Ransomware / eCrime exploitation association
- VEX (Vulnerability Exploitability eXchange) data
- Domain registration data (WHOIS, registrar, creation date)
- Passive DNS historical resolution data
- BGP routing and ASN attribution
- IP geolocation and hosting provider attribution
- Certificate Transparency Log monitoring
- Newly registered domains (NRD) monitoring
- Fast-flux and bulletproof hosting patterns
- Domain squatting / typosquat detection
- Shared hosting / infrastructure clustering
- C2 framework fingerprinting (Cobalt Strike, Sliver)
- Threat actor profiles and attribution confidence
- Motivation: espionage, financial, hacktivism, destructive
- Targeting: sector, geography, victim profile
- TTPs mapped to MITRE ATT&CK
- Infrastructure patterns and reuse
- Campaign tracking and temporal patterns
- Toolset: known malware families and custom tools
- Initial access broker relationships
- RaaS affiliate structure intelligence
- Leadership / persona attribution (where attributable)
- Phishing kit fingerprints and infrastructure
- DMARC/DKIM/SPF abuse and spoofing patterns
- Lookalike domain registration monitoring
- Business email compromise (BEC) lure patterns
- Malicious attachment hashes and document macros
- Phishing-as-a-service (PhaaS) platform tracking
- Credential harvesting page infrastructure
- QR code phishing (quishing) lure analysis
- EvilProxy / AiTM phishing proxy detection
- Callback phishing / vishing campaign patterns
- Dark web credential dump monitoring
- Stealer log data (Redline, Vidar, Raccoon)
- Paste site credential exposure
- Initial access broker listings (org-specific)
- Data leak site monitoring (ransomware groups)
- Brand impersonation on dark web forums
- Access listings (RDP, VPN, webshell sales)
- Sensitive document exposure monitoring
- Corporate email appearance in combolists
- HIBP API integration for employee exposure
- Geopolitical context and threat actor motivations
- Nation-state campaign targeting patterns
- Sector-level threat landscape assessments
- Regulatory environment changes affecting risk
- Hacktivist movement tracking and targeting
- Critical event calendars (elections, sanctions)
- Supply chain / third-party risk intelligence
- Industry incident reporting and trends
- Insurance market signals (ransomware frequency)
- Board / executive threat briefing materials
- ICS/SCADA-specific CVE and advisory tracking
- PLC/HMI firmware vulnerability monitoring
- Nation-state OT campaign intelligence
- Dragos WorldView / Claroty CTR reporting
- CISA ICS-CERT advisories
- IT-OT boundary threat patterns
- Critical infrastructure targeting intelligence
- Safety system (SIS) threat intelligence
- Industrial protocol exploitation (Modbus, DNP3)
- Living-off-the-land in OT environments
Combining CVSS, EPSS, and contextual factors to prioritise remediation. CVSS alone is insufficient โ EPSS exploitation likelihood and CISA KEV status are critical additional signals.
| Factor | Source | Weight / Use | Threshold / Action |
|---|---|---|---|
| CVSS v3.1 Base Score | NVD / vendor | Baseline severity. Use as initial filter only โ not as sole prioritisation signal. | Critical โฅ9.0 ยท High 7.0โ8.9 ยท Medium 4.0โ6.9 |
| EPSS Score | FIRST.org | Probability of exploitation in next 30 days. Updated daily. High EPSS + High CVSS = immediate priority. | >10% = elevated priority ยท >50% = critical action |
| CISA KEV Status | CISA KEV catalogue | Confirmed exploitation in the wild. KEV listing overrides scoring โ patch immediately. | KEV = 24โ72hr patch target internet-facing; 7 days internal |
| PoC / Exploit Availability | Exploit-DB, GitHub, TI platforms | Public PoC dramatically increases exploitation likelihood. Elevates priority independently of CVSS. | Public weaponised exploit = treat as KEV until confirmed otherwise |
| Asset Exposure | Internal CMDB / scan data | Internet-facing assets with the vulnerability are higher priority than internal-only. | Internet-facing: highest priority ยท Crown-jewel system: immediate escalation |
| Threat Actor Association | TI platform / advisories | Is this CVE being actively exploited by actors targeting your sector or geography? | Sector-targeted exploitation = immediate escalation regardless of other scores |
| Compensating Controls | Internal assessment | WAF, network segmentation, authentication controls may reduce exploitability. Adjust effective priority. | Documented compensating control signed by CISO can extend SLA by up to 50% |
Dissemination Targets
Where intelligence flows โ detection engineering, vuln management, executive briefing, regulatory sharing, and beyond
Output: New detection rules, IOC correlation alerts, hunt queries
SLA: Critical IOCs <1hr; vetted rules <24hr
Owner: Detection Engineering / SOC
Output: Endpoint block/alert actions, real-time threat hunting
SLA: High-confidence IOCs <2hr via API integration
Output: Network-layer blocking, proxy category updates
SLA: Critical C2 IPs <1hr
Caution: Validate before bulk push โ FP risk
Output: Block/quarantine/tag rules, sandbox triggers
SLA: Active phishing IOCs <1hr
Output: Prioritised patch schedule, emergency patch tickets, compensating control decisions
Output: Hunt packages (hypotheses + queries), new detections, IOC refinement
Cadence: Weekly + ad-hoc on new TI
Output: Monthly threat brief, ad-hoc for significant events
Format: Non-technical narrative; business impact framing
Format: STIX 2.1, TAXII 2.1, TLP-governed advisories, MISP events
Governance: Legal review required for cross-org sharing
Output: Supplier security alerts, contract review triggers, emergency notifications
Output: Updated triage playbooks, new runbooks, analyst training notes
Cadence: Monthly review; immediate for novel significant TTPs
Output: Control gap identification, red team briefs, purple team exercises, hardening recommendations
Output: Takedown requests, monitoring alerts
| Report Type | Audience | Cadence | TLP | Content |
|---|---|---|---|---|
| Flash Report | SOC, IR, Detection Eng | Ad-hoc (<2hrs) | TLP:RED/AMBER | Breaking threat with immediate action required. Single-page max. IOCs, affected systems, immediate mitigations. |
| Daily Threat Digest | SOC, TI, Security Leadership | Daily | TLP:AMBER | Curated summary of overnight alerts, new CVEs, active campaigns, notable IOCs. 1โ2 pages. |
| Malware / Campaign Report | SOC, Detection Eng, Threat Hunters | Ad-hoc | TLP:AMBER | Deep-dive analysis of a specific malware family or campaign. IOCs, TTPs, hunt queries, detection logic. |
| Actor Profile | SOC, CISO, IR, Red Team | Quarterly / on change | TLP:AMBER | Threat actor profile: motivation, TTPs, targeting, infrastructure, historical campaigns, defensive recommendations. |
| Executive Threat Brief | CISO, Board, CLO | Monthly | TLP:GREEN | Non-technical strategic brief. Business risk framing. Sector threat landscape. No IOCs. 2โ3 pages max. |
| CVE / Vuln Advisory | Vuln Mgmt, IT Ops, CISO | Ad-hoc | TLP:AMBER | Specific CVE advisory with internal applicability assessment, EPSS/KEV context, patch/workaround guidance, SLA. |
| Threat Landscape Assessment | Board, CISO, Risk | Annual | TLP:GREEN | Annual strategic threat assessment. Risk register input. Sector benchmarking. Investment recommendations. |
Email Security Intelligence
DMARC, DKIM, SPF โ authentication workflows, intelligence value, and phishing threat intelligence
Identify all email streams
Third-party senders (CRM, ticketing)
Subdomains in use
Legacy / inactive domains
Authorise all sending IPs
Avoid >10 DNS lookups
Use ~all (softfail) first
Flatten where needed
Publish public key in DNS
Configure signing on MTA
Enable for all mail streams
Rotate keys annually
Configure rua= reporting
Collect aggregate reports
Analyse all sending sources
Identify misconfigs / gaps
Monitor spam folder impact
Resolve legitimate failures
Confirm all streams passing
Target: pct=100
Spoofing now blocked
Monitor for false positives
Maintain rua reporting
Review quarterly
| Area | Intelligence Signals | Tooling / Sources | Feed Target |
|---|---|---|---|
| Header Analysis | Received chain anomalies, X-Originating-IP, authentication-results header, Reply-To mismatch, envelope From โ header From | MXToolbox, Mail Header Analyser, email gateway logs | SOC triage, phishing response playbooks |
| MX / Mail Infrastructure Recon | MX record changes (possible hijack), mail server fingerprinting, open relay detection, SMTP STARTTLS enforcement status | MXToolbox, DNSlytics, nmap | Vulnerability management, infrastructure monitoring |
| Phishing Kit Intelligence | Kit source code patterns, hosting provider patterns, certificate reuse, phishing page HTML fingerprints, credential exfil destination analysis | PhishTank, OpenPhish, FortiGuard, manual analysis | Email gateway rules, proxy blocklists |
| BEC Pattern Analysis | Display name spoofing patterns, CEO/CFO impersonation lures, vendor impersonation (invoice fraud), urgency and wire transfer language patterns | Email gateway logs, user-reported phishing, DMARC RUF | Email gateway rules, user awareness training |
| AiTM / EvilProxy Detection | Adversary-in-the-Middle phishing proxy indicators: cookie theft after MFA, unusual token reuse, logon from unexpected IP post-MFA | Entra ID sign-in logs, Defender for Identity, UEBA | SOC detection rules, identity security |
| Quishing (QR Phishing) | QR code payloads in email bodies/attachments, URL extraction from QR images, sandbox detonation of QR-delivered URLs | Email sandbox, computer vision tooling, URL detonation | Email gateway (QR scanning), user awareness |
| Credential Dump Monitoring | Corporate email addresses in leaked credential dumps, stealer log data with email credentials, combo list appearance | HIBP, Intel 471, Flare, Digital Shadows | Identity security, forced resets, SOC alerting |
| Malicious Attachment Intel | Document-based malware (macro, template injection, HTML smuggling), archive-based delivery, LNK/ISO container abuse | VirusTotal, MalwareBazaar, ANY.RUN, Tria.ge sandbox | Email gateway (file type blocking), EDR rules |
TLP Framework
Traffic Light Protocol 2.0 โ governing intelligence sharing, handling, and dissemination
Examples: active law enforcement operations, named victim details before public disclosure.
Use when: information could harm the source or recipient's operations if shared beyond the immediate community.
Examples: sector-specific IOC feeds, ISAC advisories, CERT bulletins within closed communities.
Examples: NCSC public advisories, CVE descriptions, published threat research, public YARA rules.
| Scenario | TLP | Handling Requirement |
|---|---|---|
| Active phishing campaign targeting your org โ shared by NCSC Early Warning | TLP:AMBER | Share internally with SOC and email team. Do not publish IOCs publicly or share with other organisations without NCSC permission. |
| Zero-day PoC shared by a peer in a closed ISAC community call | TLP:RED | Share only with named participants. Do not log in shared systems. Cannot be quoted or referenced outside the call. |
| CISA KEV listing for a new actively exploited CVE | TLP:WHITE | No restrictions. Share freely. Use in public-facing comms, vendor advisories, blog posts. |
| Dark web intelligence indicating org credentials for sale โ sourced from commercial TI vendor | TLP:AMBER+STRICT | Organisation only โ HR, CISO, Legal, Identity team. Not to clients, partners, or public. |
| ISAC sector threat bulletin โ distributed to ISAC members | TLP:GREEN | Share within your sector community and ISAC members. Do not post to public forums, social media, or websites. |
| YARA rule derived from malware analysis, no attribution to sensitive source | TLP:WHITE | Can be published on GitHub, shared via OTX, or submitted to VirusTotal. Community sharing encouraged. |
attack-pattern โ MITRE ATT&CK techniques
campaign โ Threat campaigns
indicator โ IOCs with pattern language
malware โ Malware family descriptions
threat-actor โ Group profiles
vulnerability โ CVE references
course-of-action โ Mitigations
Collections โ Named groups of STIX content
Authentication โ API key, OAuth 2.0, certificate
Compatible: MISP, OpenCTI, ThreatQ, Recorded Future, MITRE ATT&CK TAXII server
โข Ingest ISAC feeds
โข Share events with sector peers
โข TLP marking on all objects
โข Automated IOC push to SIEM/EDR via sync
โข Correlation across feeds to reduce duplicates
Intelligence Prioritisation
IOC triage and validation workflow, priority matrix, zero-day handling, and programme metrics
Credentials for sale on dark web (your org)
Zero-day in production software, no patch
Active phishing campaign targeting your users
Ransomware precursor IOCs detected internally
NCSC / CISA emergency alert โ sector-specific
New PoC for Critical CVE in your environment
EPSS >50% on unpatched vulnerability
Threat actor actively targeting your sector
Supply chain compromise of a key vendor
Major peer breach โ similar architecture
New threat actor TTPs โ update detections
Sector ISAC advisory โ non-immediate
New malware family โ YARA/hunt package
Infrastructure changes in known threat actor
DMARC failure spike โ investigate spoofing
Threat landscape report review
IOC feed refresh and expiry management
Threat actor profile updates
Vendor security advisory review
Executive briefing preparation
- Verify the zero-day claim โ distinguish between "unpatched CVE" and a genuinely novel vulnerability with no vendor acknowledgement
- Identify the vulnerable product and version range โ cross-reference with internal CMDB/asset inventory immediately
- Assess exploitation complexity and pre-requisites (authentication required? network access? user interaction?)
- Determine: is there evidence of active exploitation in the wild? (Threat actor use, CISA/NCSC advisory, incident reports)
- Assess internet exposure of affected assets โ internet-facing = highest immediate priority
- Check vendor advisory status โ has the vendor acknowledged? Is there a patch timeline?
- Deploy WAF rule / IPS signature if available (vendor or community-supplied)
- Network segment / isolate affected systems where operational impact allows
- Restrict network access to affected service to known-good IPs / VPN-only where possible
- Enable enhanced logging on affected systems โ prepare detection if exploit is attempted
- Create SIEM detection rule for known exploit indicators or anomalous behaviour patterns
- Disable unnecessary features / components of vulnerable software that expand attack surface
- Document compensating controls formally with CISO sign-off and review date
- Issue internal Flash Report to SOC, vulnerability management, and affected system owners within 2 hours
- Escalate to CISO if: internet-facing, no patch, active exploitation, crown-jewel system affected
- Notify IT Ops / patch management with SLA requirement and compensating control guidance
- Share with ISAC / sector peers at appropriate TLP if intelligence suggests broad targeting
- Report to NCSC Early Warning or equivalent if significant and novel
- Track vendor patch release โ trigger emergency change as soon as patch is available and validated
- Post-patch: validate, update intelligence record, produce lessons-learned note for TI programme review
| Metric | What It Measures | Target |
|---|---|---|
| MTTD โ TI-Driven | Time from threat actor activity to TI-informed detection โ measures intelligence lead time over traditional alerting | TI-informed detection <24hrs before SOC alert |
| IOC Hit Rate | Percentage of deployed IOCs generating at least one alert โ measures intelligence relevance and quality | >5% hit rate; low rate = poor source quality |
| False Positive Rate | Percentage of IOC-generated alerts that are false positives โ measures operational impact on SOC | <10% FP on blocking rules; higher acceptable on alert-only |
| Mean Time to Operationalise | Time from intelligence receipt to deployed detection/blocking rule โ measures analyst efficiency | P1: <2hrs ยท P2: <24hrs ยท P3: <7 days |
| Requirements Coverage | Percentage of PIRs addressed by current intelligence programme | >80% coverage; gaps drive source acquisition |
| IOC Expiry Compliance | Percentage of IOCs with defined TTL and active expiry management โ prevents stale FP risk | 100% of deployed IOCs with assigned TTL |