Lab 03: Threat Intelligence Platform
Objectives
Step 1: Threat Intelligence Platform Architecture
┌─────────────────────────────────────────────────────────────┐
│ INTELLIGENCE SOURCES │
│ OSINT │ Commercial │ ISAC │ Government │ Internal │
└─────────┴──────┬────────┴────────┴──────────────┴────────────┘
│
┌────────────▼──────────────┐
│ TAXII 2.1 Collection │ ← Pull/push sharing
└────────────┬──────────────┘
│
┌────────────▼──────────────┐
│ TIP Core (MISP/OpenCTI) │
│ ┌──────────────────┐ │
│ │ STIX 2.1 Store │ │ ← Indicators, TTPs, actors
│ └──────────────────┘ │
│ ┌──────────────────┐ │
│ │ IOC Lifecycle │ │ ← Active/expired/revoked
│ └──────────────────┘ │
│ ┌──────────────────┐ │
│ │ ATT&CK Mapping │ │ ← TTP enrichment
│ └──────────────────┘ │
└────────────┬──────────────┘
│
┌────────────▼──────────────┐
│ Consumers │
│ SIEM │ Firewall │ EDR │ ← Automated blocking/detection
└───────────────────────────┘Step 2: STIX 2.1 Object Model
Object Type
Purpose
Example
Step 3: TAXII 2.1 Protocol
Step 4: STIX 2.1 Builder + TAXII Envelope Creator
Step 5: Diamond Model of Intrusion Analysis
Step 6: IOC Lifecycle Management
Stage
Description
Action
Step 7: MITRE ATT&CK Integration
Step 8: Capstone — TIP Architecture Design
Summary
Concept
Key Points
Last updated
