Intelligence Card

The Intelligence Card page summarizes all the threat information fetched and analyzed by Recorded Future on the selected entity.

You can find the Intelligence Cards of the following entity types:

  • IP Address

  • URL

  • Domain

  • Hash

  • Vulnerability

The following section describes the components found in the Intelligence Card page.

Overview

The Overview tab summarizes the risk information, including Recorded Future risk score and triggered risk rules of the selected entity.

Heading

The top of the Overview tab displays the entity that you have drilled forward from the search results.

_images/rf_selectedentity.png

Selected Entity

The Back to Search option redirects you to the search results page.

_images/rf_heading.png

Back to Search

The Recorded Future option redirects you to Recorded Future’s Intelligence Card.

Triggered Risk Rules

Recorded Future has its own set of risk rules that are triggered on the basis of the risk rule evidence found in different sources. The sources include threat feeds and IP reputation lists, security research blogs, social media posts, paste sites, underground forums, and malware analysis services. You can find the triggered risk rules and their details under the Triggered Risk Rules section.

_images/rf_triggeredriskrule.png

Triggered Risk Rules

Threat Lists

The Threat Lists tab consists of the lists created by Recorded Future. It creates the list by analyzing its threat intelligence, and collection of threat lists and the whitelists published in the external community. You can find the threat lists for the selected entity under Threat Lists.

_images/rf_threatlists.png

Threat Lists

Recent References

The Recent References tab consists of entity references in external sources. These sources include cyber events, paste sites, social media, information security sources, underground forums, and dark web sources. The Recent References section displays the following information for each reference:

  • Type

  • Title

  • Source

  • Published

  • Fragment

  • URL

_images/rf_recentreferences.png

Recent References

Shodan

Shodan is a search engine for internet-connected devices that enriches the IP Address and Vulnerability Intelligence Cards with its fetched data. Shodan enriches the IP Address Intelligence Card with the following data:

  • Country

  • Organization

  • Operating system

  • ISP

  • Last update date

  • Autonomous system number (ASN)

  • Known vulnerabilities

  • Device use tags

  • Ports

Shodan also displays the geographic location of an IP address in a map.

_images/rf_shodanmap.png

Map

You can find the enriched data for the IP address under General Information, Tags, and Ports.

_images/rf_shodanip.png

Enriched Data for IP Address

Shodan enriches the Vulnerability Intelligence Card with fetched data from the Exploit Database. You can find the enriched data under the Exploits section.

_images/rf_shodanvulnerability.png

Enriched Data for Vulnerability


Helpful?

We are glad this guide helped.


Please don't include any personal information in your comment

Contact Support