Threat Intelligence
What is Threat Intelligence?
Threat Intelligence in Tripl-i provides automated integration with trusted security data sources to identify known malicious software, network infrastructure, and attack patterns. This data powers the security detection capabilities across the platform.
Why Threat Intelligence Matters
- Stay Current: Threat landscape changes daily with new malware variants
- Expert Curation: Leverage security researcher expertise without dedicated staff
- Automated Updates: No manual IOC management required
- Proven Data: Industry-trusted sources with verified threat data
Integrated Sources
ThreatFox (abuse.ch)
The primary source for malware command & control (C2) infrastructure.
| Metric | Value |
|---|---|
| Total IOCs | 51,877+ |
| Malware Families | 160+ |
| Unique IPs | 32,774+ |
| Update Frequency | Daily |
| Confidence | High (verified C2 servers) |
Top Tracked Threats:
| Malware Family | IOC Count | Threat Type |
|---|---|---|
| Xtreme RAT | 8,545 | Remote Access Trojan |
| Cobalt Strike | 8,099 | C2 Framework |
| Meterpreter | 2,517 | Post-exploitation |
| AsyncRAT | 2,282 | Remote Access Trojan |
| Sliver | 2,221 | C2 Framework |
| Remcos | 2,152 | Remote Access Trojan |
LOLBAS (Living Off The Land)
Tracks legitimate Windows system tools that can be abused for malicious purposes.
| Metric | Value |
|---|---|
| Binaries Tracked | 200+ |
| Techniques | Process execution, download, bypass |
| MITRE Mapping | Full ATT&CK coverage |
Common LOLBAS Tools:
certutil.exe- Download and decode filesmshta.exe- Execute HTA applicationsregsvr32.exe- Proxy executionrundll32.exe- Execute DLL functionspowershell.exe- Script execution
CISA KEV (Coming Soon)
Known Exploited Vulnerabilities catalog from the US Cybersecurity Agency.
- Actively exploited vulnerabilities
- Federal remediation deadlines
- Vendor/product impact mapping
Understanding Threat Data
Indicators of Compromise (IOCs)
IOCs are forensic artifacts that indicate potential malicious activity:
| IOC Type | Example | Detection Method |
|---|---|---|
| IP Address | 185.243.112.80 | Network connection monitoring |
| Domain | malware-c2.com | DNS query analysis |
| URL | http://bad.com/payload | Web traffic inspection |
| File Hash | SHA256 fingerprint | File integrity checking |
| Process | suspicious.exe | Process monitoring |
Confidence Levels
Each IOC has an associated confidence level:
| Level | Meaning | Action Recommendation |
|---|---|---|
| High | Verified malicious | Immediate response |
| Medium | Likely malicious | Investigation required |
| Low | Potentially suspicious | Monitor and assess |
Threat Types
Common threat classifications in the system:
| Type | Description | Risk Level |
|---|---|---|
| Ransomware | Encrypts files for ransom | Critical |
| Botnet | Part of coordinated attack network | Critical |
| RAT | Remote Access Trojan | Critical |
| C2 Framework | Command & Control tools | Critical |
| Backdoor | Unauthorized access mechanism | High |
| Trojan | Disguised malicious software | High |
| Spyware | Information stealing malware | High |
| Rootkit | Deep system compromise | Critical |
Viewing Threat Intelligence
Policy Details
Each software policy sourced from threat intelligence includes:
- Source Information: Which feed provided the data
- Last Updated: When the data was refreshed
- IOC Count: Number of indicators associated
- Threat Notes: Context about the threat
Network IOC Details
For policies with network indicators:
- IP Addresses: Known C2 server IPs
- Ports: Communication ports used
- Direction: Inbound, outbound, or both
- Last Seen: Most recent observation date
Data Quality
Why We Choose These Sources
| Criteria | ThreatFox | LOLBAS |
|---|---|---|
| Reputation | Industry standard | Community trusted |
| False Positive Rate | Very low | Low (context-dependent) |
| Update Speed | Real-time | Community-driven |
| Verification | Security researcher verified | Documented techniques |
| Coverage | C2 infrastructure | System tool abuse |
Sources We Avoid
Not all threat feeds are equal. We specifically avoid sources with:
- High false positive rates
- Unverified submissions
- Short retention windows (48-hour lists)
- Mixed attack types (SSH brute force mixed with C2)
Threat Intelligence in Action
Detection Workflow
1. Threat feed updated with new Cobalt Strike C2 IP
↓
2. Tripl-i imports IOC into Software Policy
↓
3. Network scan runs for tenant
↓
4. Connection to C2 IP detected
↓
5. Security event created with full context
↓
6. Notification sent to security team
Example Detection
When a workstation connects to a known Cobalt Strike server:
Event Details:
- Title: Network IOC Detected: Cobalt Strike C2
- Severity: Critical
- Host: WORKSTATION-001
- Remote IP: 47.95.207.79:443
- Process: svchost.exe
- Action Required: Immediate investigation
Best Practices
Interpreting Detections
- Verify the Connection: Confirm the network connection exists
- Check the Process: Is it a legitimate process or suspicious?
- Review Context: What was the user doing?
- Assess Impact: What data could be compromised?
- Contain if Needed: Isolate the system if confirmed
Reducing False Positives
- Some legitimate services may share hosting with malicious infrastructure
- Cloud provider IPs may have historical malicious associations
- Add exclusions for verified false positives
- Document exclusion decisions for audit
Staying Informed
- Review critical severity detections immediately
- Trend high-severity detections weekly
- Audit medium/low severity monthly
- Update exclusion lists as needed
Frequently Asked Questions
Q: How current is the threat data? A: Threat intelligence feeds are updated daily. Critical threats may be updated more frequently.
Q: Can I add my own threat indicators? A: Yes, create manual software policies with custom IOCs through the UI.
Q: What if a detection is a false positive? A: Add an exclusion to the policy and document the reason. The system will stop alerting on that specific combination.
Q: Are all detections confirmed compromises? A: No, detections indicate connections to known malicious infrastructure. Investigation is required to confirm actual compromise.
Related Topics
- Software Policies - Managing security policies
- Network IOC Scanning - How scanning works
- Security Events - Responding to detections