Creating Intelligence Requirements
  • 10 Jul 2024
  • 10 Minutes to read
  • Dark
    Light

Creating Intelligence Requirements

  • Dark
    Light

Article summary

Overview

An Intelligence Requirement (IR) is a collection of topics or a research question reflecting an organization’s cyber threat–related priorities that guides a security or threat intelligence team’s research and analysis efforts. In ThreatConnect®, you can create IR objects in your Organization by using a logic-based keyword query that identifies and retrieves information relevant to the IR.

When creating an IR, you first provide information including a unique summary of the IR, a unique ID number for the IR, the IR’s subtype, the IR’s category, and any metadata (Description and Tags) that you want to add to the IR. ThreatConnect then provides you with a set of suggested keywords based on the IR’s summary. Next, you select keywords from this set to include and exclude in the query, or you can enter your own keywords manually.

After you have finalized your query, you can view a preliminary set of results comprising Artifacts, Cases, Groups, Indicators, Tags, and Victims in the ThreatConnect owners to which you have access and the ThreatConnect Global Intelligence Dataset. You can also view each result in more detail to identify the matching keyword(s) and the part of the result that matched the keyword(s). Finally, you can save the IR to your Organization.

Important
The ThreatConnect Global Intelligence Dataset, historically known as CAL™, is used to retrieve keyword suggestions for IRs and global results for IR keyword queries. Even if CAL is not turned on for your ThreatConnect instance, you can still leverage the ThreatConnect Global Intelligence Dataset. In this scenario, data returned from the ThreatConnect Global Intelligence Dataset will be read only, and no information stored in your instance will be shared with or collected by CAL.

Before You Start

User Roles

  • To create, edit, or delete an IR, your user account must have an Organization role of Standard User, Sharing User, Organization Administrator, or App Developer.
  • To retrieve results manually for an IR, your user account must have an Organization role of Standard User, Sharing User, Organization Administrator, or App Developer.

Creating an IR

Follow these steps to create an IR in ThreatConnect:

  1. Hover over Create on the top navigation bar and select Intelligence Requirement (IR).
  2. Proceed through the steps on the Create Intelligence Requirement (IR) screen to create the IR. There are three steps in the IR creation process: Details (required), Keyword Tracking (required), and View Results (optional).

Step 1: Enter Details About the IR

The Details step of the Create Intelligence Requirement (IR) screen (Figure 1) is a required step where you enter basic information about the IR you are creating.

Note
To view best practices for creating IRs, click the Intelligence Requirement Help link.

Figure 1_Creating Intelligence Requirements_7.3.0

 

Follow these steps to fill out the fields on the Details step:

  1. Provide the following details for the IR:
    • Requirement: Enter a unique summary of the IR (i.e., the question, topic, or statement on which the IR focuses). The summary you enter cannot be the same as the summary for an existing IR in your Organization.
    • ID: Enter a unique ID for the IR. The ID you enter cannot be the same as the ID for an existing IR in your Organization.
      Note
      If your company or organization does not have an existing ID naming convention in place for IRs, it is recommended to identify the IR’s subtype in the ID. For example, the ID for a Priority Intelligence Requirement (PIR) would look like PIR-001.
      Important
      You cannot change an IR’s ID after it has been created.
    • Owner: The name of the Organization in which the IR will be created. This value is the name of your Organization and cannot be changed. IRs cannot be created in Communities or Sources.
    • Subtype: Select one of the following subtypes for the IR:
      • Intelligence Requirement (IR): Threats of overall concern to an organization (e.g., cyber threats, fraud, geopolitical/physical threats).
      • Priority Intelligence Requirement (PIR): Threat actor motives; tactics, techniques, and procedures (TTPs); targets; impacts; or attributions in association with IRs.
      • Specific Intelligence Requirement (SIR): Facts associated with threat activity, such as indicators of compromise (IOCs).
      • Request for Information (RFI): One-off requests for information related to topics of interest to particular stakeholders.
      • Research Requirement (RR): A topic or area of investigation that is of interest to an individual or group and does not merit a full IR, but does require tracking of relevant information.
    • Category: (Optional) Select a category for the IR. If your System Administrator has not created any IR categories, the only available option will be None.
    • Description: (Optional) Enter a default Description for the IR.
    • Tags: (Optional) Enter one or more Tags to apply to the IR.
  2. Click Next to proceed to the Keyword Tracking step.

Step 2: Configure the IR’s Keyword Query

Clicking Next on the Details step will display the Keyword Tracking step (Figure 2). This is a required step where you define a logic-based keyword query for the IR.

Note
To view best practices for defining IR keyword queries, click the Keyword Best Practices & Help link.
Important
The maximum number of keywords you are allowed to use when defining a keyword query for an IR is determined by your System Administrator and is displayed at the top of the Keyword Tracking step.

Figure 2_Creating Intelligence Requirements_7.6.1

 

Follow these steps to fill out the fields on the Keyword Tracking step and configure your IR query logic:

  1. Add at least one keyword to the Includes Any of the Following section.
  2. (Optional) Click + Add Section to add another Includes Any of the Following section, and then add at least one keyword to that section. This step may be repeated as desired.
  3. (Optional) Add one or more keywords to the Excludes Any of the Following section.
  4. Click Next to proceed to the View Results step (optional), or click Save to create the IR and view its Details screen.

IR Query Logic

You will build the query by defining one or more sets of keywords to include and, optionally, a single set of keywords to exclude. Each set of keywords to include is defined in an Includes Any of the Following section, where all keywords in that section are joined together using “OR” logic. If you have multiple Includes Any of the Following sections, the sections themselves are joined together using “AND” logic. Finally, a single set of keywords to exclude is defined in the Excludes Any of the Following section, where all keywords in that section are joined together using “OR” logic. The portion of the query in the Excludes Any of the Following section is joined to the rest of the query using “AND NOT” logic. See Best Practices: Keywords for Intelligence Requirements for more details and an example demonstrating the query logic.

Add Keywords

The Requirement Keyword Suggestions section displays keyword suggestions based on the text you entered in the Requirement field on the Details step (“What threats are targeting financial institutions based in the United Kingdom?” in the example in Figure 2). These suggestions are potential aliases for keywords recognized in the Requirement field based on geography, industry, MITRE ATT&CK® tactics and techniques, intrusion sets, tools, and malware families.

Note

Industry-based keyword suggestions include North American Industry Classification System (NAICS) codes and their associated descriptions, such as NAICS: 521 – monetary authorities-central bank and NAICS: 52 – finance and insurance in Figure 2. When you include a NAICS keyword suggestion in your query, the results of your IR will include the following:

  • The standard Tag for that NAICS code in the CAL Automated Threat Library Source and other feeds that leverage NAICS codes in ThreatConnect;
  • The standard Tags for available NAICS subsector (three-digit) codes in the CAL Automated Threat Library Source if the selected keyword suggestion is a two-digit code (e.g., if you select NAICS: 52 – finance and insurance, then the Tags for that code’s subsectors—521, 522, 523, 524, and 525—will also be included); and
  • CAL ATL Report Groups that have CAL ATL industry classification Tags corresponding to the keyword suggestion, representing a set of Reports broadly associated with the industry term that you can investigate (Global results only).

For more information on the use of NAICS codes in CAL ATL, see the “How Are ATL Reports Classified by Industry?” section of CAL ATL Industry Classification. For more information on NAICS codes in IR keyword suggestions, see the “Intelligence Requirements” section of CAL ATL Industry Classification.

Select keywords from the Requirement Keyword Suggestions section and then click + Add to “Include” or + Add to “Exclude” at the bottom of the section to add them to an Includes Any of the Following section or the Excludes Any of the Following section, respectively. When a keyword is added to one of these sections, it will be removed from the Requirement Keyword Suggestions section. You can also add keywords manually by entering the keyword in the Type keyword here… box under the section header and then clicking +.

Note
If there are multiple Includes Any of the Following sections, you will be prompted to select which of these sections (i.e., Section 1, Section 2, etc.) to add the selected keywords to when you click + Add to “Include”.

Figure 3 shows an Includes Any of the Following section with three keywords added.

Figure 3_Creating Intelligence Requirements_7.6.1

 

After you have added keywords to a section, you can click Get Suggestions in that section to retrieve a set of keyword suggestions based only on the keywords added to that section.

Hint

Click Get Suggestions for All, under the Requirement Keyword Suggestions section, to retrieve a set of keyword suggestions for each Includes Any of the Following section and the Excludes Any of the Following section based only on the keywords added to the respective section.

Step 3: View Results for the IR (Optional)

Clicking Next on the Keyword Tracking step will display the View Results step (Figure 4). This step is where you can view a preliminary set of Artifacts, Cases, Groups, Indicators, Tags, and Victims in your ThreatConnect owners (Local)and the ThreatConnect Global Intelligence Dataset (Global) that the keyword query returned. The total number of results of the selected type (Local or Global) is displayed to the right of the Results heading.

Important
If there are more than 500 results of the selected type (Local or Global) available, the table will display only the most recent 500 results of the selected type.

Figure 4_Creating Intelligence Requirements_7.6.1

 

  • Local: Select this option to view query results in your Organization, Communities, and Sources. When searching for local results, the query searches everything you have access to in your ThreatConnect owners, including all Attributes, Tags, names/summaries of objects, and the contents of files attached to Report and Document Groups. Click a result’s name to view its Details screen. Click a result’s row to see its Result Details drawer, which displays the date and time that the result matched the query and highlights the text in the result that matched one or more of the query keywords.
    Note
    The Result Details drawer is not available for Tags.
  • Global: Select this option to view query results in the ThreatConnect Global Intelligence Dataset. If you have access to the CAL Automated Threat Library Source and a global result exists in that Source, you can click its name to view its Details screen. Click a result’s row to see its Result Details drawer, which displays the date and time that the result matched the query and highlights the text in the result that matched one or more of the query keywords.
    Note
    The Result Details drawer is not available for Tags.
    Note
    Indicators with a CAL score of 150 or lower will not be included in the global results.
  • Retrieve Results: Click Retrieve Results to retrieve the most recent results of the selected type (Local or Global) for the IR’s keyword query.

Click the Save button to create the IR and view its Details screen.

Result Details Drawer

The Result Details drawer highlights the fields or other information in a result that matched one or more query keywords, as well as the date and time that the result was matched. For example, in Figure 5, the highlighted words in the result’s name, the Description Attribute, and the Source Attribute are matches to three of the query keywords (finance, uk, and bank). Expand the Keyword Tracking section to view the IR’s query keywords.

Note
If the Result Details drawer does not display any highlighted words, it is possible that the matching text exists in a file or other document attached to the result. You can view a result’s attachments on the result’s Details screen. Note that matched terms will not be highlighted in attachments.

Figure 5_Creating Intelligence Requirements_7.6.1

 


ThreatConnect® is a registered trademark, and CAL™ is a trademark, of ThreatConnect, Inc.
MITRE ATT&CK® and ATT&CK® are registered trademarks of The MITRE Corporation.

20159-05 v.03.A


Was this article helpful?