TruSTAR's Indicator Prioritization Intel Workflows enable you to build data sets of Indicators with specific characteristics. For example, you might want to build up a data set of known bad Indicators to feed to your detection tool, triggering alerts faster while reducing false positives. And because TruSTAR supports multiple Intel Workflows, you can create a second data set that focuses on URLs, domains, and IP addresses and use that data set with your investigation tools to provide more context faster, saving both time and energy of your analysts.
There are three stages to a TruSTAR Intel Workflow:
Across those three stages, TruSTAR does the heavy lifting: collecting the data, cleaning it up, prioritizing it, and connecting it to Enclaves or other tools. It’s where things get interesting, so let’s dive in and take a look.
In this first part of the workflow, we bring in structured, semi-structured and unstructured data from intelligence sources that you specify. Each source, whether it’s a premium (subscription) feed or an open source feed, contains different Indicators, each with a score and perhaps other contextual information, depending on the source.
In the Indicator Prioritization Intel Workflow, you can easily choose the sources you want by clicking the checkbox next to a source name. In addition, we provide a weighting factor that you can use to increase the importance of sources you know and trust. In the example above, the Bambeneck C2 IP Feed has been weighted as 5, while the URLScan source has been assigned a value of 1. This means that more weight will be given to Indicators from the Bambenek source than from the URLScan source.
The next step in the workflow is to prepare the data by filtering it, mapping it and then normalizing it.
Filtering removes the types of Indicators you do not want in your data set. TruSTAR supports 14 types of Indicators but you may only want to use IP addresses, CIDR blocks, and URLs, for example. The Transformations page of the Indicator Prioritization page lets you specify which Indicators to keep and which to discard.
In the mapping step, we interpret the heterogeneous data coming from across different sources and map them to a generic indicator schema. Mapping also involves extracting necessary context and the score that the intelligence source has assigned to an Indicator.
Every intelligence source categorizes Indicators, scores, and attributes in their own specific way. The normalization step converts these multiple conventions into a single format that eventually will help with aggregation. Two specific normalizing operations are important to produce quality data: Indicator value and scores.
In this phase of the workflow, we aggregate Indicators, remove safe terms, and assign a final score.
Aggregation combines all the information about an Indicator into one item. Up to this point, each Indicator from each source held onto its normalized score and to any attributes that source provided, such as threat actors, MITRE ATT&CK tags, or text tags. Now, we take all that information and create a single Indicator that contains all that information, including which source provided what attributes.
When you set up an Indicator Prioritization Intel Workflow, you have the option to specify one or more Safelist Libraries that contain items your organization believes are not malicious. These terms can be wildcard terms, domains, private subnets and other observables. The aggregated Indicators that are generated from your workflows will be labeled safe and excluded from your aggregated indicators if they are present in the Safelist Library.
The final step in prioritizing the data is to assign the new Indicator a priority score based on the normalized score for each intel source and the context that we have associated with the score.
Once you’ve created your Indicator Prioritization Intel Workflow, TruSTAR runs periodically and produces an updated data set. You can direct that data set into a private Enclave in TruSTAR or you can send it directly to a third-party tool using one of our Workflow Apps.
If you’re like most security professionals, you’ll want to examine the data set to ensure it is producing the data most useful to you. TruSTAR uses Postman script to provide an easy way to view the data and then you can edit the workflow to change the output, if needed.
As you can see, TruSTAR’s Indicator Prioritization Intel Workflow takes the complexity out of using multiple sources to create a high-fidelity data set that can be easily integrated into your security tools.
To learn more about Intel Workflows, check out our Knowledgebase articles or watch our video.
The Splunk platform removes the barriers between data and action, empowering observability, IT and security teams to ensure their organizations are secure, resilient and innovative.
Founded in 2003, Splunk is a global company — with over 7,500 employees, Splunkers have received over 1,020 patents to date and availability in 21 regions around the world — and offers an open, extensible data platform that supports shared data across any environment so that all teams in an organization can get end-to-end visibility, with context, for every interaction and business process. Build a strong data foundation with Splunk.