Module 3: Communication and Reporting for Threat Hunters
Last updated
Last updated
TLP:Red: Used when information cannot be effectively acted upon without significant risk to teh privacy, reputation, or operations of the organizations involved. Information is usually exchanged verbally or in person and is only for use by the specific recipient(s) and may not be shared outside of the exchange, meeting, or conversation in which it was originally disclosed.
TLP:Amber+Strict: Used when exposure of the information carries a risk to privacy, reputation, or operations, but the information requires support from second parties to be effectively acted upon. Information can be shared on a need-to-know basis with members of their own organization.
TLP:Amber: Used when information carries a risk to privacy, reputation, or operations if exposed beyond the source and recipient organizations. Information can be shared on a need-to-know basis within the recipient organization and its clients.
TLP:Green: Used when information is not intended for public exposed but carries no risk when used within the recipient's organization and its wider community of peer and partner organizations. Information may not be shared outside of the cyber security or cyber defense community.
TLP:Clear: Used when the information carries minimal or no foreseeable risk of misuses and may be shared without restriction.
Using cURL to send a request to the MITRE threat intelligence API:
Not much to add, just talking about the different approaches to threat hunting and their order of operation.
Not much to add, essentially adhere to responsible disclosure policies.
Not much to add, talking about writing up threat intel reports via MITRE ENGENUITY's CTI Blueprints.