Lab 03: Threat Intelligence Platform

Time: 50 minutes | Level: Architect | Docker: docker run -it --rm zchencow/innozverse-cybersec:latest bash

Objectives

  • Architect a Threat Intelligence Platform (TIP)

  • Build STIX 2.1 objects and bundles

  • Implement TAXII 2.1 sharing protocol

  • Apply the Diamond Model and MITRE ATT&CK integration


Step 1: Threat Intelligence Platform Architecture

┌─────────────────────────────────────────────────────────────┐
│              INTELLIGENCE SOURCES                            │
│  OSINT  │  Commercial  │  ISAC  │  Government  │  Internal  │
└─────────┴──────┬────────┴────────┴──────────────┴────────────┘

    ┌────────────▼──────────────┐
    │   TAXII 2.1 Collection    │  ← Pull/push sharing
    └────────────┬──────────────┘

    ┌────────────▼──────────────┐
    │   TIP Core (MISP/OpenCTI) │
    │   ┌──────────────────┐   │
    │   │  STIX 2.1 Store  │   │  ← Indicators, TTPs, actors
    │   └──────────────────┘   │
    │   ┌──────────────────┐   │
    │   │  IOC Lifecycle   │   │  ← Active/expired/revoked
    │   └──────────────────┘   │
    │   ┌──────────────────┐   │
    │   │  ATT&CK Mapping  │   │  ← TTP enrichment
    │   └──────────────────┘   │
    └────────────┬──────────────┘

    ┌────────────▼──────────────┐
    │   Consumers               │
    │  SIEM │ Firewall │ EDR    │  ← Automated blocking/detection
    └───────────────────────────┘

Step 2: STIX 2.1 Object Model

STIX Domain Objects (SDOs):

Object Type
Purpose
Example

indicator

Detectable pattern (IOC)

Malicious IP, hash, domain

malware

Malware family description

Ransomware family details

threat-actor

Adversary profile

APT28, Lazarus Group

attack-pattern

TTP (MITRE ATT&CK)

T1059.001 PowerShell

campaign

Coordinated attack activity

Operation Aurora

course-of-action

Mitigation/response

Patch CVE-2021-44228

relationship

Links objects together

indicator → indicates → malware

STIX Pattern Examples:


Step 3: TAXII 2.1 Protocol

TAXII 2.1 API Endpoints:

TAXII Envelope format:

💡 TAXII sharing models: Push (producer sends to consumers), Pull (consumers fetch from producers), Hub-and-Spoke (central clearing house like FS-ISAC).


Step 4: STIX 2.1 Builder + TAXII Envelope Creator

📸 Verified Output:


Step 5: Diamond Model of Intrusion Analysis

Vertices:

  • Adversary: Who (threat actor, motivation, intent)

  • Capability: What (malware, exploit, technique)

  • Infrastructure: How (C2 domains, IPs, bulletproof hosting)

  • Victim: Target (industry, geography, role)

Meta-features: Timestamp, Phase, Result, Direction, Methodology, Resources

Application: For each intrusion event, populate all four vertices. Cross-reference events to identify campaigns (shared infrastructure or capability = same adversary).


Step 6: IOC Lifecycle Management

Stage
Description
Action

Collection

IOC received from feed/incident

Ingest to TIP

Processing

Deduplication, normalisation

Run through pipeline

Analysis

Context enrichment, confidence scoring

Analyst review

Active

Deployed to controls (firewall, EDR, SIEM)

Monitoring

Review

Periodic validity check

Re-score or revoke

Expired

TTL exceeded or indicator stale

Archive

Revoked

Confirmed false positive

Remove from controls

IOC confidence scoring:

💡 IOC decay: IP-based IOCs lose relevance in 24-72 hours (shared hosting). Domain IOCs last 7-30 days. Hash IOCs are more durable but can be trivially changed by attackers.


Step 7: MITRE ATT&CK Integration

ATT&CK Navigator use cases:

  • Map detected TTPs to ATT&CK matrix

  • Identify coverage gaps (unheatmapped techniques = blind spots)

  • Compare threat actor profiles to your detection coverage

TIP → SIEM → ATT&CK workflow:

MISP Galaxy integration:

  • Import ATT&CK galaxy clusters into MISP

  • Tag events with ATT&CK technique IDs

  • Export heatmap to ATT&CK Navigator


Step 8: Capstone — TIP Architecture Design

Scenario: Design a TIP for a financial sector ISAC with 50 member organisations


Summary

Concept
Key Points

STIX 2.1

JSON-based standard: indicators, malware, threat-actors, relationships

TAXII 2.1

HTTP API for sharing STIX bundles (pull/push)

Diamond Model

Adversary ↔ Capability ↔ Infrastructure ↔ Victim

IOC Lifecycle

Collect → Process → Analyse → Active → Review → Expire/Revoke

ATT&CK Integration

Map TTPs to detection coverage; identify blind spots

TLP

Traffic Light Protocol: WHITE/GREEN/AMBER/RED for sharing scope

Last updated