How to enrich a suspicious indicator (IP, domain, hash) with public OSINT
언제 쓸까: You have an IOC from an alert and need context before escalating.
사전 조건
- Skill cloned — git clone https://github.com/7onez/cti-expert ~/.claude/skills/cti-expert
흐름
-
Submit the indicatorEnrich 185.234.218.95 using public OSINT — WHOIS, passive DNS (free sources), reputation feeds.✓ 복사됨→ Structured context: ASN, geo, historical resolutions, known bad
-
Map to MITRE ATT&CK if applicableIf this matches a known campaign, map to ATT&CK tactics/techniques.✓ 복사됨→ TTP list with ATT&CK IDs
-
Write upProduce a tactical report: what it is, confidence level, recommended actions.✓ 복사됨→ Short, decision-oriented write-up
결과: A defensible enrichment you can attach to a ticket in minutes.
함정
- Treating reputation scores as ground truth — Record the source + date; note confidence explicitly
- OSINT queries accidentally tip off the target — Only use passive sources; no active scanning