How to enrich a suspicious indicator (IP, domain, hash) with public OSINT
Wann einsetzen: You have an IOC from an alert and need context before escalating.
Voraussetzungen
- Skill cloned — git clone https://github.com/7onez/cti-expert ~/.claude/skills/cti-expert
Ablauf
-
Submit the indicatorEnrich 185.234.218.95 using public OSINT — WHOIS, passive DNS (free sources), reputation feeds.✓ Kopiert→ Structured context: ASN, geo, historical resolutions, known bad
-
Map to MITRE ATT&CK if applicableIf this matches a known campaign, map to ATT&CK tactics/techniques.✓ Kopiert→ TTP list with ATT&CK IDs
-
Write upProduce a tactical report: what it is, confidence level, recommended actions.✓ Kopiert→ Short, decision-oriented write-up
Ergebnis: A defensible enrichment you can attach to a ticket in minutes.
Fallstricke
- Treating reputation scores as ground truth — Record the source + date; note confidence explicitly
- OSINT queries accidentally tip off the target — Only use passive sources; no active scanning