How to enrich a suspicious indicator (IP, domain, hash) with public OSINT
何时使用: You have an IOC from an alert and need context before escalating.
前置条件
- Skill cloned — git clone https://github.com/7onez/cti-expert ~/.claude/skills/cti-expert
步骤
-
Submit the indicatorEnrich 185.234.218.95 using public OSINT — WHOIS, passive DNS (free sources), reputation feeds.✓ 已复制→ Structured context: ASN, geo, historical resolutions, known bad
-
Map to MITRE ATT&CK if applicableIf this matches a known campaign, map to ATT&CK tactics/techniques.✓ 已复制→ TTP list with ATT&CK IDs
-
Write upProduce a tactical report: what it is, confidence level, recommended actions.✓ 已复制→ Short, decision-oriented write-up
结果: A defensible enrichment you can attach to a ticket in minutes.
注意事项
- Treating reputation scores as ground truth — Record the source + date; note confidence explicitly
- OSINT queries accidentally tip off the target — Only use passive sources; no active scanning