MMNA
Threat Intel Academy
📊 MODULE 1 OF 3
🔍 INTELLIGENCE FOUNDATIONS

Threat Intelligence Foundations

Understanding Data Sources & The Intelligence Lifecycle

Master the foundational concepts of threat intelligence. Learn how to identify, collect, and process threat data from multiple sources. Build understanding of the intelligence lifecycle and how SOCs leverage threat intelligence to enhance defense. From OSINT to internal telemetry, transform raw data into actionable security insights.

Threat Intelligence Overview

Strategic and Operational Intelligence Concepts

🎯
Strategic Intelligence
Big-picture view of threat landscape. Strategic intelligence answers: What threat actors exist? What are their capabilities? Which industries/regions do they target? What are long-term trends? Used by leadership and strategy teams for resource allocation and risk assessment.
📊
Operational Intelligence
Day-to-day security operations. Operational intelligence answers: What attacks are happening now? Which specific indicators should we block? What campaigns are active? Operationalized immediately by SOC teams, firewalls, and detection systems.
🔐
Tactical Intelligence
Incident-specific details. Tactical intelligence answers: What are the technical details of this attack? How does this malware work? What's the attack infrastructure? Used during active incident response to understand and contain threats.
🚨
SOC Relevance
SOCs need all three types but emphasize operational intelligence. SOCs translate strategic intelligence into detection rules, incorporate tactical intelligence into incident response procedures, and execute day-to-day operations informed by intelligence.

🎓 Why Intelligence Matters to Security Operations

Without intelligence, SOCs are blind. They react to alerts without context. With intelligence, SOCs see the threat landscape clearly. Intelligence enables predictive defense: teams know which threats are most likely, can prioritize detection efforts, and allocate resources efficiently. Intelligence transforms SOCs from reactive to proactive.

Intelligence Data Sources

Collecting Threat Data from Multiple Channels

🔍 Open-Source Intelligence (OSINT)

OSINT is publicly available information that reveals threat actor behavior and infrastructure. OSINT sources include: domain registration data (WHOIS), DNS records, public threat feeds, social media, code repositories, academic papers, conferences, news articles, and archived websites.

Why it matters: OSINT is free, legal, and abundant. Threat actors leave tracks everywhere—registered domains, DNS zones, public forums discussing exploits. Intelligent collection of OSINT reveals attack infrastructure before attacks happen. Many high-confidence indicators originate from OSINT.

Examples: Shodan queries for exposed devices, GitHub monitoring for leaked credentials, domain registrant analysis to link attack infrastructure, threat actor forum posts indicating upcoming campaigns.

📡 Internal SOC Telemetry

Your own network generates the most relevant threat intelligence: logs from firewalls, proxies, endpoints, servers, cloud platforms, and security tools. Internal telemetry shows what actually hits your environment—attempted attacks, suspicious connections, malicious file detections.

Why it matters: External feeds tell you what exists globally. Internal telemetry tells you what threatens YOUR organization specifically. A payload detected on one endpoint might indicate broader compromise. Unusual connection patterns might indicate command-and-control communication.

Examples: Firewall logs showing blocked malicious IPs, EDR detecting unusual process execution, web proxy logs showing access to known malicious domains, DNS queries to suspicious C2 servers.

🔗 Threat Indicator Feeds

Subscribed feeds provide continuously updated indicators: malware hashes, command-and-control IPs, phishing URLs, compromised credentials. Feeds come from threat intelligence companies, government agencies (CISA, NSA), security vendors, and community platforms.

Why it matters: Processing OSINT manually is time-consuming. Feeds automate: new indicators are automatically distributed and ingested into detection systems (firewalls, SIEM, endpoint protection). When a new malware variant emerges, feed subscribers know within hours.

Feed Types: IP reputation feeds (malicious IPs), domain reputation feeds (phishing/malware domains), hash feeds (malware signatures), URL feeds (malicious links), credential feeds (leaked credentials), CVE feeds (vulnerability intelligence).

The Intelligence Lifecycle

From Raw Data to Actionable Defense

Step 1
Collection
Gather threat data from all sources: OSINT research, internal logs, purchased feeds, dark web monitoring, incident responses. Data is collected continuously. Volume is high—thousands of events per second in enterprise environments. Challenge: managing data volume.
Step 2
Processing & Enrichment
Raw data requires cleaning and enrichment. Normalize data formats (different feeds use different formats for the same indicator). Enrich with context: add geolocation, reputation scoring, threat actor attribution, related indicators, confidence levels. Processing reduces noise and adds value.
Step 3
Analysis
Analysts examine processed data for patterns and meaning. What do these indicators suggest? Are they related to a known campaign? What's the threat actor likely to do next? Analysis includes correlation (linking related events), attribution (identifying threat actors), and forecasting (predicting future attacks).
Step 4
Dissemination
Intelligence is shared with teams that need it. SOC teams get actionable alerts and detection rules. Leadership gets strategic reports. Operational teams (sysadmins, network engineers) get relevant tactical information. Dissemination format matters: data scientists get raw data; executives want summaries.

🔄 Lifecycle Feedback Loop

Intelligence lifecycle isn't linear—it's circular. Disseminated intelligence informs defense. Defense operations (incident response) generate new data. That data feeds back into collection, creating continuous improvement. As defenses improve, attacks adapt. Intelligence must adapt in response.

  • Detection generates leads: SOC detects suspicious activity → triggers investigation → reveals threat actor infrastructure → feeds back into intelligence
  • Incident response builds knowledge: Each incident teaches what works, what doesn't → improves detection rules → prevents similar attacks
  • Intelligence improves prediction: Historical data shows patterns → models predict future attacks → defenses shift proactively

Enterprise Risk Perspective

Turning Data Into Defense Insights

💼 Intelligence as Strategic Risk Management

From enterprise perspective, threat intelligence directly impacts risk. Organizations face thousands of potential threats. Intelligence answers: Which threats are most likely? Which would be most damaging? Where should we invest defensive resources?

Without intelligence: Resources spread thin across all possible threats. Defenses are generic, reactive. Attackers choose weak targets.

With intelligence: Resources concentrate on threats most likely to succeed. Defenses are targeted, proactive. Attackers find hardened targets and look elsewhere.

📊
Risk Quantification
Intelligence enables quantified risk: likelihood scores (how probable is attack), impact estimates (what damage if successful), historical breach data. Leadership makes budget decisions based on data, not gut feeling.
🎯
Threat Prioritization
Not all threats are equal. Intelligence reveals which threat actors target your industry, which have capability to breach you, which have attacked similar companies. Prioritization ensures maximum defensive impact per dollar spent.
🔮
Predictive Defense
Intelligence forecasts likely future attacks. If specific threat actor group campaigns against your industry, defenses shift to counter that group's known techniques. Predictive defense prevents incidents rather than responding to them.
📈
Continuous Improvement
Each incident provides data. Metrics track improvement: detection time decreases, fewer breaches, faster response. Intelligence-driven organizations measurably reduce cyber risk over time.

🎯 Practical Example: Intelligence in Action

Threat intelligence team identifies campaign targeting financial institutions in your region. They research the threat actor group: known TTPs (techniques, tactics, procedures), typical attack chain, command-and-control infrastructure.

Intelligence team shares findings with SOC: indicators (IPs, domains, file hashes), detection signatures, incident response procedures specific to this threat group. Network team blocks known C2 IPs at firewall. Endpoint team deploys detection rules for known malware variants.

Result: When threat group attempts attack against your organization (6 months later), detection systems catch it immediately. Incident response team (pre-trained by threat intelligence) contains quickly. Damage prevented by proactive defense enabled by intelligence.

Advanced Learning Resources

Deepen Your Knowledge with Industry Resources

📚 Key Reading

  • APT Trend Reports from Mandiant/Google: Comprehensive annual reports on threat actor trends and campaigns
  • Threat Intelligence Blogs: Industry leaders publish threat research weekly on threat behavior, new attack techniques, and campaign analysis
  • SANS Cyber Aces: Free security tutorials and references for intelligence professionals
🎓
Verified Certificate Notice
Complete all 3 modules of this course to unlock your
Verified Cyber Security Certificate
from MONEY MITRA NETWORK ACADEMY

with unique ID and QR verification
✓ Lifetime access to course materials
✓ Digital credential for professional profiles
✓ QR code for employer verification
✓ Shareable certificate on LinkedIn

Ready for Module 2?

You've completed Module 1 foundations. Next, dive into advanced analytics, behavioral modeling, and attacker pattern recognition in Module 2.