Overview of Intelligence Cards

Intelligence Cards bundle essential information related to a specific investigation topic, like a technical indicator, malware family, or software vulnerability. Intelligence Cards are a starting point for triage, and are pivot points during an investigation.

Six types of Intelligence Cards are available, and more detail about each is available through the links in the list below.  The rest of this page includes general descriptions of common components found in most, if not all, Intelligence Cards. 

  • IP Address - individual IPs and IP ranges (CIDRs)
  • Domain - Domains and DNS names for FQDNs, Name Servers, Mail Exchanges, etc.
  • Hash - includes MD5, SHA-1 and SHA256 hashes
  • Vulnerability - primarily CVE vulnerabilities from NIST NVD
  • Malware - malware family names
  • Threat Actor - threat actor groups 

Across all types, Intelligence Cards provide a similar baseline set of information sections. This overview introduces these common sections first, then adds details for specific Intelligence Card types.

Heading

The heading section identifies the entity summarized in this card, and provides the first and last dates when reporting about this entity was observed. The heading section also offers actions, including data exports and creating a share link for this card.

Risk Score

Risk Scores are provided for IP Addresses, Domains, Hashes, and Vulnerabilities. The score is based on a set of risk rules. Each rule triggers based on specific evidence, and can independently age out. The input sources for risk rules include over 700,000 web sources including social media, TOR forums and information security repositories and over 30 threat feeds.

Each risk rule has a severity level. The risk score for an entity is in a banded determined by the highest severity risk rule that is currently triggered. Additional risk rules triggered at lower severity levels will slightly increase the overall risk score. Multiple risk rules triggered at same severity levels cause a larger increase in score, but will never cause the score to risk into the band of risk scores reserved for higher severity levels.

Screen_Shot_2017-05-01_at_3.18.34_PM.png

Intelligence Cards provide transparency into the evidence for each risk rule, usually including one or more reporting sources and links back to documents published by these sources.

Screen_Shot_2017-05-01_at_3.18.43_PM.png

In addition to this transparency (i.e., about how many risk rules were triggered by an entity), we also mention how many risk rules in total are being used to evaluate an entity's risk.  In the example above, IP Address 138.201.95.72 has triggered 5 out of a total of 40 risk rules.  Because our research on risk rules is continuous, updates to the risk rules may change at any time, and does not instantaneously propagate throughout our data.  It is possible for some minor discrepancies to occur as our data is being updated (e.g., two different Intelligence Cards for the same entity type such as a file hash may not agree on the total number of hash risk rules).  Such discrepancies are expected to be short lived and relatively infrequent.

Threat Lists

When the entity is currently including in one more threat lists, this is reflected on the Intelligence Card. Recorded Future tracks updates to threat lists, daily or more frequently depending on the cadence of the threat list provider. A removal of the entity from an external threat list is rapidly reflected in Recorded Future, and risk rules are updated accordingly.  Note that entities included in whitelists and mitigation lists will also reflect that list here.  A description of each list is available here.

Recent Event Timelines

Recorded Future organizes reporting involving the entity by time, and Intelligence Cards include a timeline of reporting in the last 60 days.

Malware, Vulnerability, and Threat Actor cards may show two timelines. The first timeline, colored in blue, summarizes all reported events involving this entity in the last 60 days. The second timeline summarizes reported Cyber Attack and Cyber Exploit events specifically. Each day in the cyber event timeline is color-coded by the criticality of the Cyber Threat signal for this entity on that date.

Context

These lists summarize other infrastructure and entities reported together with the primary entity for the Intelligence Card. The Context section records co-occurrences, which are mentions of the Intelligence Card entity and the related entity from this section in the same sentence or document.  The co-occurrences do not make any assertion about the nature or strength of the connection between entities, just that they were mentioned together.

The length of the blue bar for each related entity shows the relative frequency with which it is mentioned in conjunction with the primary entity. You can view the specific events for each link by clicking on the related entity in the list. You can view more related entities, beyond the top list shown in the Intelligence Card, by clicking the Show in Table action.

Extensions

Extensions are integrations that enhance Intelligence Cards with content from our Intelligence Partners. Click here to learn more.

Technical Profile and Enrichment Service Links

Convenience navigation links are included for several enrichment services that publish information to the security community. These include DomainTools (domain registration and WHOIS), Shodan (open ports and services) and VirusTotal (malware linked to the infrastructure through static or sandbox behavioral analysis.)

Recent References and First Reference

Each Intelligence Card concludes with a set of individual references, highlighted based on time of reporting (most recent report and first report) or highlighted as the most recent report from an event type or group of sources. These highlighted recent events include Cyber Events, Paste Sites, Social Media, Information Security sources, Underground Forums, and Dark Web sources.

Request Data Review

Recorded Future processes unstructured data from open web, technical web, dark web, expert research, and customer provided sources with machine learning and natural language processing techniques. While we have both rigorous automated and manual processes in place to ensure the highest quality threat intelligence, there may be small errors or misattributions in our intelligence cards. If you come across a data inaccuracy, help us improve the information by Requesting a Data Review and one of our expert researchers will conduct a review. 

On any intelligence card

  1. Navigate to the top right-hand corner 
    Screen_Shot_2019-10-05_at_10.50.26.png
  2. Click the menu
  3. Click “Request Data Review
  4. A dialogue window will appear. Please include as much information as possible about the request so that our expert researchers are able to focus their attention on the specific data element.
    Screen_Shot_2019-10-05_at_10.52.35.png

 

Was this article helpful?
0 out of 0 found this helpful

This content is confidential. Downloading or distributing this content is in violation of your Recorded Future license agreement. Sharing this content outside of licensed Recorded Future users constitutes a breach of the terms and/or agreement and shall be considered a breach by your organization.
Have more questions? Submit a request

Comments

0 comments

Please sign in to leave a comment. Please note that your name will be displayed. If you would like to change how your name appears, please update your profile name.