Scenario: Wei creates an intelligence workflow in Splunk Mission Control to enrich data
The following scenario features Buttercup Games, a fictitious game company.
Buttercup Games recently released the latest version of its artificial intelligence gaming software. Wei, a security operations center (SOC) administrator at Buttercup Games, uses Threat Intelligence Management in Splunk Mission Control to detect and enrich security threats.
Since the release, several employees have received malicious emails. To contextualize each email with additional information, such as whether the email contains malware, Wei decides to use an intelligence workflow in Splunk Mission Control. Only company administrators can create and manage intelligence workflows, and because Wei is a SOC administrator at Buttercup Games, they can configure the workflow.
In this scenario, Wei uses Threat Intelligence Management in Splunk Mission Control to create an intelligence workflow that enriches data from malicious emails.
Wei creates an intelligence workflow
After navigating to Content and then Workflows in Splunk Mission Control, Wei follows these three steps to configure a new intelligence workflow.
Wei provides details for the workflow
Wei names the workflow Medium and High Email Addresses and, to filter their internal event data by priority, selects Indicator prioritization for the workflow type.
Indicators are pieces of data that provide additional information about unusual, suspicious, or malicious cyber activity. In Wei's case, indicators include threat actors and malware associated with a malicious email.
Wei selects intelligence sources for indicator prioritization
In Splunk Mission Control, intelligence sources are feeds that enrich your internal event data with threat intelligence. Intelligence sources can be internal or external.
Wei uses Threat Intelligence Management to normalize, score, and prioritize data from their desired intelligence sources by following these steps:
- Wei sends Buttercup Games' internal event data to Threat Intelligence Management.
- To normalize the data, Wei selects two external sources: Digital Shadows and VirusTotal.
- The weight of an intelligence source represents the source's influence in the final indicator scoring. Because Wei wants to prioritize VirusTotal over Digital Shadows in the scoring, they set the weight of Digital Shadows to 1 and the weight of VirusTotal to 3. This means 25% of the score comes from Digital Shadows and 75% from VirusTotal.
Wei filters the prioritized indicators
To identify only malicious emails, Wei filters the prioritized indicators from Digital Shadows and VirusTotal for EMAIL_ADDRESS indicators with Medium and High scores.
Now that Wei has created a list of prioritized indicators for email addresses, they select Create workflow to save it. The workflow now appears in Wei's list of intelligence workflows.
Every few minutes, Threat Intelligence Management runs a data processing pipeline that applies the preferences specified in the workflow to Wei's entire intelligence library and sends the resulting records to Splunk Mission Control.
Wei activates the intelligence workflow for data processing
After navigating to Content and then Workflows in Splunk Mission Control, Wei activates the intelligence workflow they created and begins to investigate incidents involving malicious email addresses.
Summary
In this scenario, Wei used Splunk Mission Control to enrich data from malicious emails by creating a workflow that periodically normalizes data against intelligence sources, passes the data through filters specified in the workflow, and transforms the results into a destination data repository.
Learn more
To learn more about Threat Intelligence Management in Splunk Mission Control, see:
Scenario: Wei creates an intelligence workflow in Splunk Mission Control to reduce false positives |
This documentation applies to the following versions of Splunk® Mission Control: Current
Feedback submitted, thanks!