Threat Intelligence Guide
IOC types, OSINT vs commercial feeds, MITRE ATT&CK basics for SOC and blue teams
TI Guide
IOC types, OSINT vs commercial, MITRE ATT&CK basics
In this guide
1. What is threat intelligence?
Threat intelligence is processed information about adversaries and their tactics, techniques and procedures (TTPs), used by security teams to make better defense decisions. It is consumed at three levels:
- Strategic: board-level briefings about threat actor motives, geopolitical context and long-term trends. Output: written reports.
- Operational: campaign reports tied to specific threat groups (e.g. "Kimsuky targeting US think tanks Q2 2026"). Output: TTP narratives, victimology, infrastructure clusters.
- Tactical: concrete indicators (URLs, IPs, hashes) that can be ingested into a SIEM, firewall or EDR. Output: machine-readable feeds.
Threat intelligence is more than IOC blocklists. It includes context (who, why, when), attribution (which group), motive (financial, espionage, hacktivism) and the relationship between an indicator and the broader campaign. The list of URLs is the easiest layer to produce and the easiest for adversaries to rotate, which is why mature programs invest beyond IOCs into TTP-level detection.
2. IOC types and lifecycle
An indicator of compromise is an artefact observed during or after an intrusion that suggests malicious activity. The four types you will meet most often:
| IOC type | Typical volume | Half-life | Best use |
|---|---|---|---|
| URL | Very high | Hours to days | Immediate proxy / DNS sinkhole blocking |
| Domain | High | Days to weeks | Blocking and category enrichment |
| IP address | Medium | Days to months | Blocking with caution (high FP risk on shared hosting / CDN) |
| File hash | Lower | Permanent | Endpoint scanning, AV signatures, retroactive hunts |
Every IOC moves through four stages from collection to retirement:
- Collection: sourced from sandboxes, honeypots, partner feeds, OSINT or analyst observation.
- Enrichment: WHOIS, passive DNS, reputation scores, sandbox detonations, MITRE ATT&CK technique tagging.
- Action: blocking, alerting or monitoring; routed to SIEM, firewall, EDR, MISP or SOAR.
- Expiration: aged out by per-type TTL. URLs after a few days, IPs after weeks, hashes effectively never.
Without per-type TTL, a SIEM rule built on a 6-month-old URL list will alert on legitimate traffic to a domain that the original adversary lost months ago.
3. OSINT vs commercial feeds
There is no single best feed. Most mature SOCs ingest both OSINT and commercial intelligence; the trick is matching feed properties to the use case.
| Property | OSINT (TweetFeed, abuse.ch, OTX) | Commercial (Recorded Future, Mandiant, CrowdStrike) |
|---|---|---|
| Cost | Free | $5k - $200k+ per year |
| Freshness | Minutes (TweetFeed: every 15 min) | Real-time, push-based |
| Coverage | Crowdsourced subset, broad | Comprehensive, deep |
| FP rate | Higher (no analyst curation) | Lower (analyst-validated) |
| License | Permissive (CC0, MIT) | Restrictive, per-seat |
| Support | Community / GitHub issues | SLA, analyst chat, scheduled briefings |
| Best for | Breadth, budget-constrained teams, signal volume | Depth, attribution-grade context, regulated industries |
A common pattern: OSINT feeds drive automated proxy and DNS blocks at scale; commercial intelligence drives incident response, attribution and executive briefings. The two are complementary, not substitutes.
4. MITRE ATT&CK basics
MITRE ATT&CK is a knowledge base of adversary tactics, techniques and procedures maintained by the MITRE Corporation. It organises observed adversary behaviour into 14 tactics (the "why" of an action) and over 200 techniques (the "how"). Most threat intelligence reports and detection rules cite ATT&CK technique IDs (e.g. T1059 for Command and Scripting Interpreter, T1071 for Application Layer Protocol) so analysts can normalise across vendors.
The 14 ATT&CK Enterprise tactics, in execution order:
- Reconnaissance
- Resource Development
- Initial Access
- Execution
- Persistence
- Privilege Escalation
- Defense Evasion
- Credential Access
- Discovery
- Lateral Movement
- Collection
- Command and Control
- Exfiltration
- Impact
Reference: attack.mitre.org · Threat group catalogue · Enterprise technique matrix.
5. How TweetFeed fits
- Source: ~95 Twitter/X security researchers, scraped via RSS every 15 minutes.
- Output: CSV, JSON, RSS, MISP events and an MCP server, in windows of today / week / month / year. See /feeds.
- License: CC0 1.0 Public Domain. No authentication, no rate limit for normal use, no attribution required.
- Strengths: high recall, real-time signal, tagged with malware family and category for easy filtering.
- Limitations: lower precision than analyst-curated feeds; cross-reference VirusTotal, urlscan.io or your sandbox before automated blocking.
- Best fit: high-volume signal feed, complementary to commercial intelligence; primary feed for resource-constrained teams; teaching dataset for blue-team training.
Integration recipes for MISP, OpenCTI, Splunk, KQL and IntelOwl on the Threat Hunting page.
6. Common pitfalls
- Blocking on IPs alone. Shared hosting and CDNs reuse IPs across legitimate and malicious tenants. An IP is enrichment, not a verdict. Block only with corroborating signals (active sample, beacon traffic).
- Ignoring TTL. A six-month-old URL feed is mostly noise. Configure per-type TTL: hours for URLs, days for IPs, weeks for domains, never for hashes.
- Treating IOC = verdict. An IOC is a lead. Cross-reference VirusTotal, urlscan.io, your sandbox, or pivot through passive DNS before automating action.
- Single-feed dependency. Each feed has blind spots. Stack two or three feeds (one OSINT, one commercial, one peer-shared via ISAC/ISAO) and dedup on the way in.
7. Glossary
- APT (Advanced Persistent Threat)
- A well-resourced adversary that maintains long-term access to a target environment. Often nation-state aligned. Tracked by aliases that vary by vendor.
- IOC (Indicator of Compromise)
- An observable artefact (URL, domain, IP, file hash) that suggests malicious activity in an environment.
- C2 / C&C (Command-and-Control)
- The infrastructure adversaries use to control compromised hosts. Common protocols: HTTPS, DNS, custom encrypted channels.
- TTP (Tactic, Technique, Procedure)
- The behaviour layer above IOCs. Harder for adversaries to change than infrastructure. Captured in MITRE ATT&CK.
- OSINT (Open-Source Intelligence)
- Intelligence sourced from publicly available information: blogs, social media, forums, leaked databases.
- SOCMINT (Social Media Intelligence)
- A subset of OSINT focused on social platforms (X/Twitter, LinkedIn, Telegram). TweetFeed is a SOCMINT-driven IOC feed.
- MITRE
- A US not-for-profit corporation that maintains the ATT&CK adversary behaviour knowledge base and the CWE software-weakness catalogue, among other public-good projects.
8. Frequently asked questions
What is threat intelligence?
Threat intelligence is processed information about adversaries and their tactics, techniques and procedures (TTPs), used by security teams to make better defense decisions. It spans three levels: strategic (board-level briefings on threat actor motives), operational (campaign reports tied to specific threat groups) and tactical (concrete indicators such as URLs, IPs and file hashes that can be ingested into a SIEM or firewall).
What is an IOC?
An indicator of compromise (IOC) is an artefact observed during or after an intrusion that suggests malicious activity. Common IOC types are URLs, domains, IP addresses and file hashes (MD5, SHA-1, SHA-256). IOCs are the most volatile layer of the Pyramid of Pain: easy to collect, easy for adversaries to rotate, but immediately actionable.
How quickly do IOCs become stale?
It depends on the type. URLs and IPs often rotate within hours to days as adversaries take down infrastructure. Domains can persist for weeks. File hashes are essentially permanent (a hash uniquely identifies a binary). Configure your SIEM to honour different time-to-live values per IOC type, or you risk blocking legitimate traffic on stale entries.
Should I block traffic based on IOCs alone?
Block on high-confidence IOCs (file hashes, exact malicious URLs) but treat IPs and domains as enrichment signals first. IPs in particular have high false-positive rates because shared hosting, CDNs and cloud providers will reuse them across legitimate and malicious tenants. Cross-reference VirusTotal, urlscan.io or your sandbox before automated blocking.
What is MITRE ATT&CK?
MITRE ATT&CK is a knowledge base of adversary tactics, techniques and procedures maintained by the MITRE Corporation. It organises observed adversary behaviour into 14 tactics (initial access, persistence, lateral movement, exfiltration, etc.) and over 200 techniques. Most threat-intel reports and detection rules cite ATT&CK technique IDs (T1059, T1071) so analysts can normalise across vendors.
What is an APT?
Advanced persistent threat (APT) describes a well-resourced adversary, often nation-state aligned, that maintains long-term access to a target environment. APTs are tracked by aliases that vary by vendor (Kimsuky / Velvet Chollima / TA427, APT29 / Cozy Bear / Midnight Blizzard) because attribution analysts work from different telemetry. Same actor, different name.
OSINT vs commercial threat intelligence: which should I use?
OSINT feeds (TweetFeed, abuse.ch, AlienVault OTX) are free, broad and high-volume but noisier and less curated. Commercial feeds (Recorded Future, Mandiant Advantage, CrowdStrike Falcon Intelligence) are expensive but offer SLAs, analyst access and lower false-positive rates. Most mature SOCs blend both: OSINT for breadth and budget, commercial for depth and analyst-grade context.
How fresh should my threat-intel feed be?
Match feed cadence to IOC volatility. URL feeds should refresh in minutes (TweetFeed updates every 15 minutes; commercial feeds are real-time). Domain feeds in hours. File-hash feeds can refresh daily. Stale URL feeds are essentially useless: a phishing URL up an hour ago is often offline by the time a daily-refresh feed reaches you.
Is TweetFeed enterprise-ready?
TweetFeed is a free OSINT feed: high recall, lower precision, no SLA, no analyst support. It is suitable as a complement to commercial intelligence or as the primary feed for resource-constrained teams. Treat IOCs as leads to triage, not as verdicts. Always cross-reference before automated blocking.
Where can I learn more about threat intelligence?
Start with the SANS Cyber Threat Intelligence resources, the MITRE ATT&CK framework documentation, NIST SP 800-150 (Guide to Cyber Threat Information Sharing) and the OWASP Top 10 for application-layer context. For practitioner blogs, follow Mandiant, Microsoft Threat Intelligence and Cisco Talos. Most ATT&CK technique pages link to the relevant primary sources.
License
Guide content: CC0 1.0 Public Domain. No attribution required, no warranty. TweetFeed IOC data is also CC0; source code for the pipeline: github.com/0xDanielLopez/TweetFeed (MIT).