Recorded Future Intel Cards provide actionable threat intelligence data neatly curated by investigation topic and presented in a comprehensive single view, saving analysts time otherwise spent connecting the dots themselves. The six Intel Card types are IP Address, Domain, Hash, Vulnerability, Malware, and Threat Actor.
1. What’s an
Intel Card?
Recorded Future Intel Cards
present threat intelligence data
from hundreds of thousands of
sources in a comprehensive single
view, and updated in real time.
3. Time Is Crucial
When it comes to cyber investigations, time management is critical.
Security teams gain instant context around suspicious observables
and indicators with Recorded Future Intel Cards — with one click.
Intel Cards are organized in a consolidated view, dramatically
increasing the speed and efficiency of threat research and analysis.
4. Intel Card
Types
Intel Cards are divided into six
investigation types, with more on
the way. The breadth of our
real-time data collection and
analysis is unrivaled.
IP Address
Domain
Hash
Vulnerability
Threat Actor
Malware
5. Data Exports
Share Links
Threat Lists
Timelines
Extensions
Intel Card
Features
Intel Card data is harvested from
hundreds of thousands of sources
on the open, deep, and dark web,
as well as threat feeds, technical
collection, and security reporting.
Risk Scores
6. Header
When first accessing an Intel Card, you can observe the precise entity name along with
its pseudonyms, the first and last date that reporting was observed, and the
references related to the entity. You can also export the entity data.
7. Header
When first accessing an Intel Card, you can observe the precise entity name along
with its pseudonyms, the first and last date that reporting was observed, and the
references related to the entity. You can also export the entity data.
8. Header
When first accessing an Intel Card, you can observe the precise entity name along with
its pseudonyms, the first and last date that reporting was observed, and the
references related to the entity. You can also export the entity data.
9. Header
When first accessing an Intel Card, you can observe the precise entity name along with
its pseudonyms, the first and last date that reporting was observed, and the
references related to the entity. You can also export the entity data.
10. Header
When first accessing an Intel Card, you can observe the precise entity name along with
its pseudonyms, the first and last date that reporting was observed, and the
references related to the entity. You can also export the entity data.
11. Header
Malware Intel Cards display the malware category in the header. Threat Actor
Intel Cards display the country the hacker group is associated with, as well as any
related usernames and email addresses.
12. Header
Malware Intel Cards display the malware category in the header. Threat Actor Intel
Cards display the country the hacker group is associated with, as well as any
related usernames and email addresses.
13. Header
Malware Intel Cards display the malware category in the header. Threat Actor Intel
Cards display the country the hacker group is associated with, as well as any related
usernames and email addresses.
14. Risk Score
Risk score ratings are based on a set of risk rules and report the severity level of an
entity from zero to 99. Each risk rule trigger is based on specific, collected evidence
and is available for the IP Address, Hash, and Vulnerability Intel Cards.
15. Risk Score
Risk score ratings are based on a set of risk rules and report the severity level of an
entity from zero to 99. Each risk rule trigger is based on specific, collected evidence
and is available for the IP Address, Hash, and Vulnerability Intel Cards.
16. Threat Lists
A specific entity is listed here upon showing up in one or more threat lists. Updates are
tracked by Recorded Future daily or even more frequently. Any removals of the
specific entity from an external threat list are reflected in entity threat list rules.
17. Threat Lists
A specific entity is listed here upon showing up in one or more threat lists. Updates
are tracked by Recorded Future daily or even more frequently. Any removals of the
specific entity from an external threat list are reflected in entity threat list rules.
18. Recent Event Timelines
Primary timelines show an entity’s reporting in the last 60 days. Malware, Threat
Actor, and Vulnerability Intel Cards may display a secondary timeline with reported
cyber attack and exploit events. Most Threat Actor Intel Cards display two.
19. Recent Event Timelines
Primary timelines show an entity’s reporting in the last 60 days. Malware, Threat
Actor, and Vulnerability Intel Cards may display a secondary timeline with reported
cyber attack and exploit events. Most Threat Actor Intel Cards display two.
20. Recent Event Timelines
Primary timelines show an entity’s reporting in the last 60 days. Malware, Threat
Actor, and Vulnerability Intel Cards may display a secondary timeline with reported
cyber attack and exploit events. Most Threat Actor Intel Cards display two.
21. Targeting and Operations
Threat Actor Intel Cards summarize methods, targets, and operations from cyber
attack events. When the threat actor is directly reported as the attacker of an event,
further information can be accessed by clicking any top related entity.
22. Targeting and Operations
Threat Actor Intel Cards summarize methods, targets, and operations from cyber
attack events. When the threat actor is directly reported as the attacker of an event,
further information can be accessed by clicking any top related entity.
23. Related Entities (Context)
Alternate entities that have been reported in relation to a primary entity are
summarized in related entities lists. For Malware Intel Cards, related email addresses
will be listed here, which can be helpful in identifying relevant online personas.
24. Related Entities (Context)
Alternate entities that have been reported in relation to a primary entity are
summarized in related entities lists. For Malware Intel Cards, related email
addresses will be listed here, which can be helpful in identifying online personas.
25. Subdomains
The Domain Intel Card type shows summaries of the parent domain, siblings, and
DNS names within a domain. Once discovered by Recorded Future, every subdomain
that shares the same registered domain name is listed here, along with its references.
26. Subdomains
The Domain Intel Card type shows summaries of the parent domain, siblings, and
DNS names within a domain. Once discovered by Recorded Future, every subdomain
that shares the same registered domain name is listed here, along with its references.
27. Technical Profile and
Enrichment Service Links
Navigation links for enrichment services are included in an entity’s Intel Card profile.
DomainTools, Shodan, and VirusTotal are among the resource links available.
28. Technical Profile and
Enrichment Service Links
Navigation links for enrichment services are included in an entity’s Intel Card profile.
DomainTools, Shodan, and VirusTotal are among the resource links available.
29. Technical Profile and
Enrichment Service Links
Navigation links for enrichment services are included in an entity’s Intel Card profile.
DomainTools, Shodan, and VirusTotal are among the resource links available.
30. Recent References and
First Reference
First and recent references provide context for threat investigations. A large increase
in recent references may indicate an emerging threat or a new tactic/exploit.
31. Recent References and
First Reference
First and recent references provide context for threat investigations. A large increase
in recent references may indicate an emerging threat or a new tactic/exploit.
32. Intel Card Extensions
Recorded Future OMNI Intelligence Partners provide complementary information for
our Intel Cards, maximizing the value of research.
33. How Do Teams Use Intel Cards?
Rapidly research
vulnerabilities with
speed and confidence.
Threat Intelligence
Methodically automate
correlation rules with
dynamic risk scoring.
Security Operations
Effectively react to
attacks with complete
threat context.
Incident Response
34. Consolidated Intelligence
There are massive numbers of external threat intelligence sources,
but attempting to find and collate information manually will prove
inefficient at best and potentially fruitless.
Our Intel Cards present this real-time threat intelligence in a single
view, unifying thousands of data points — so you can increase
productivity and be more effective in your role.
35. Request a Demo
Confidently detect important incidents you would have
otherwise missed using real-time threat intelligence.
Request a demo of our Intel Cards now:
www.recordedfuture.com