All Posts
Threat Intelligence Platform
1
min read

Doing Threat Intel the Hard Way - Part 5: Analyze Threat Intelligence

Published on
March 9, 2017
Table of Contents

This is the fifth post in a series on manual IOC management for threat intelligence. See the previous posts:

Part 1: Manual IOC Management Part 2: Capturing Threat Intelligence Part 3: Processing Threat Intelligence Part 4: Operationalizing Threat Intelligence


Analyze Threat Intelligence

Everything we have discussed to this point is meant to deliver the right information to your analysts, but the intelligence must still be analyzed. To do this an analyst work flow process must be established that includes incident escalation and response processes.

The Analyst work flow must provide a repeatable process to analyze the output of the integrations you have created in the previous steps. For example, if the SIEM determines that a server is communicating with a known botnet command and control domain, your analyst must be notified in some fashion (on screen prompt, email, SMS, IM, etc.). The analyst must then evaluate the collected information and take appropriate action based on the information’s accuracy. If the analyst determines that the notification is not valid, they should then document their findings for future reference and move on to the next analysis. If the analyst verifies that the notification is correct, they should begin a formal set of incident response steps.

In addition to providing analysts a work flow, you must also provide them with the necessary tools to gather information on the incidents they analyze. This is where enrichment of the sort discussed in the processing step can be useful. Analysts use sites like Shodan, Web of Trust, VirusTotal etc. to gather additional information on selected indicators. Integrating these sources of information into your threat intelligence platform will remove the need to seek them out manually, thus saving your analysts precious time when making an escalation decision.

One final tool you may wish to provide to analysts is the ability to perform indicator expansion in their research. Indicator expansion is a two-step process in which an analyst will first examine indicators related to the indicators seen in the local environment, then conduct a secondary search to see if any of those indicators are present. Many organizations struggle with this due to short retention periods of gathered log data. An analyst can only investigate as far back as their data reaches.

Up next in the series: Threat Intelligence Maintenance

FEATURED RESOURCES

January 13, 2026
Anomali Cyber Watch

Anomali Cyber Watch: Cisco ISE Flaw, Ni8mare, N8scape, Zero-Click Prompt Injection and more

Anomali Cyber Watch: Cisco ISE Flaw Enables Arbitrary File Read via Administrative Access. Ni8mare and N8scape Vulnerabilities Expose n8n Automation Platforms to Full Compromise. Zero-Click Prompt Injection Abuse Enables Silent Data Exfiltration via AI Agents. Phishing Attacks Exploit Misconfigured Email Routing to Spoof Internal Domains. Ransomware Activity in the U.S. Continued to Rise in 2025. Android Ghost Tap Malware Drives Remote NFC Payment Fraud Campaigns. Black Cat SEO Poisoning Malware Campaign Exploits Software Search Results. MuddyWater Upgrades Espionage Arsenal with RustyWater RAT in Middle East Spear-Phishing. China-Linked ESXi VM Escape Exploit Observed in the Wild. Instagram Denies Data Breach Despite Claims of 17.5 Million Account Data Leak
Read More
January 6, 2026
Anomali Cyber Watch

Anomali Cyber Watch: OWASP Agentic AI, MongoBleed, WebRAT Malware, and more

Real-World Attacks Behind OWASP Agentic AI Top 10. MongoDB Memory Leak Vulnerability “MongoBleed” Actively Exploited. WebRAT Malware Spread via Fake GitHub Proof of Concept Exploits. Trusted Cloud Automation Weaponized for Credential Phishing. MacSync macOS Stealer Evolves to Abuse Code Signing and Swift Execution. Claimed Resecurity Breach Turns Out to Be Honeypot Trap. Cybersecurity Professionals Sentenced for Enabling Ransomware Attacks. Google Tests Nano Banana 2 Flash as Its Fastest Image AI Model. RondoDox Botnet Exploits React2Shell to Hijack 90,000+ Systems. Critical n8n Expression Injection Leads to Arbitrary Code Execution
Read More
December 23, 2025
Anomali Cyber Watch

Anomali Cyber Watch: SantaStealer Threat, Christmas Scams of 2025, React2Shell Exploit, Phishing via ISO, and more

SantaStealer Infostealer Threat Gains Traction in Underground Forums. From Fake Deals to Phishing: The Most Effective Christmas Scams of 2025. React2Shell Exploitation Expands With New Payloads and Broader Targeting. Russian Phishing Campaign Delivers Phantom Stealer via ISO Attachments. And More...
Read More
Explore All