July 26, 2018
Justin Swisher

What is Tactical Threat Intelligence?

<p><em>This is the fourth blog in a series called, “What is Threat Intelligence?”. Continue with the series at the bottom of this page. </em></p><h2>Tactical Intelligence</h2><p>Tactical intelligence is the on-the-ground view, which describes granular, atomic indicators that are associated with known attacks. This is the most basic form of threat intelligence and is often used for machine-to-machine detection of threats, and for incident responders to search for specific known-bad artifacts in enterprise networks. These are your common “IOCs.”</p><p><em>Tactical Intel for APT29</em></p><ul><li>628d4f33bd604203d25dbc6a5bb35b90</li><li>2aabd78ef11926d7b562fd0d91e68ad3</li><li>3d3363598f87c78826c859077606e514</li><li>meek-reflect.appspot.com</li><li>portal.sbn.co.th</li><li></li><li>hxxps://files.counseling[.]org/eFax/incoming/150721/5442.zip</li><li>googleService.exe</li><li>GoogleUpdate.exe</li><li>acrotray.exe</li><li>PCIVEN_80EE&amp;DEV_CAF</li></ul><p><em>Tactical Intel for Education Sector</em></p><ul><li>d9b7b0eda8bd28e8934c5929834e5006</li><li>support@securitygrade[.]org</li><li></li><li>Fish love water!!!!!!!!</li><li>Fish not love cat!!!!!!!</li><li>parol</li></ul><h2>Using Tactical Intelligence</h2><p>Tactical intelligence and IOCs are meant to historically document cyber attacks, serving both as a corpus of evidence (for compliance, law enforcement, investigations, legal purposes, and CYA’s for executives who need to withstand scrutiny on why their company got pwned) and also as reference material for analysts to interpret and extract context for use in defensive operations.</p><p>IOCs come from bona fide incidents and malware and are provided to analysts at a tactical level to serve as examples of a particular threat, such as a particular malware sample, malware family, intrusion campaign, or threat actor. IOCs represent a small sample of known-bad things -- not all known-bad things -- and obviously, IOCs cannot find any unknown-bad things.</p><p>Think of an IOC as a biological specimen in a laboratory. An invasive plant in the United States is captured and brought back to the lab. It is meant to be studied carefully, weighed and measured, dissected, classified and so forth. From this study, we may glean insights on where it came from, who created it, its role in the ecosystem, what makes it healthy, and what kills it. We may be able to figure out its perfect environment and use that knowledge to find other plants like it. We may be able to cut it apart and find out how it spreads so quickly. We might be able to use attributes of the plant to find other invasive plants. IOCs require the same study for application in cyber defense.<br/> <br/> Check out the other blogs in our series for a deeper look into the types of threat intelligence and how they are used. <br/> <br/> <a href="https://www.anomali.com/blog/what-is-threat-intelligence">What is Threat Intelligence? </a><br/> <a href="https://www.anomali.com/blog/what-is-strategic-threat-intelligence">What is Strategic Threat Intelligence? </a><br/> <a href="https://www.anomali.com/blog/what-is-operational-threat-intelligence">What is Operational Threat Intelligence?</a> </p>

Get the Latest Anomali Updates and Cybersecurity News – Straight To Your Inbox

Become a subscriber to the Anomali Newsletter
Receive a monthly summary of our latest threat intelligence content, research, news, events, and more.