How to enrich a suspicious indicator (IP, domain, hash) with public OSINT
Quando usar: You have an IOC from an alert and need context before escalating.
Pré-requisitos
- Skill cloned — git clone https://github.com/7onez/cti-expert ~/.claude/skills/cti-expert
Fluxo
-
Submit the indicatorEnrich 185.234.218.95 using public OSINT — WHOIS, passive DNS (free sources), reputation feeds.✓ Copiado→ Structured context: ASN, geo, historical resolutions, known bad
-
Map to MITRE ATT&CK if applicableIf this matches a known campaign, map to ATT&CK tactics/techniques.✓ Copiado→ TTP list with ATT&CK IDs
-
Write upProduce a tactical report: what it is, confidence level, recommended actions.✓ Copiado→ Short, decision-oriented write-up
Resultado: A defensible enrichment you can attach to a ticket in minutes.
Armadilhas
- Treating reputation scores as ground truth — Record the source + date; note confidence explicitly
- OSINT queries accidentally tip off the target — Only use passive sources; no active scanning