integration with BAE Systems®
Threat Intelligence enables ThreatConnect customers to import Events and Attributes from the BAE MISP instance into ThreatConnect as Incidents and Indicators (Address, Host, Email Address, URL, CIDR, File, ASN, and User Agent), respectively. In addition, the app ingests MISP Galaxy types of Threat Actors and Attack Patterns. Threat Actors are ingested as Adversaries and associated to Incidents in ThreatConnect. Attack Patterns are created as MITRE ATT&CK™ Tags on Incidents. See MITRE ATT&CK
for more information on how MITRE ATT&CK classifications are represented in ThreatConnect.