CTI Teams have long relied on sandboxing to analyze threats and extract IOCs. But —treating individual IOCs ( aka clues left behind) in isolation is a common pitfall. This isn’t a brand-new challenge, and many experts have advocated for moving away from indicator-only feeds. Still, the conversation is worth revisiting because the industry continues to struggle with relevance of feeds, missed campaigns/threats, wasted time caused by the flood of false positives.
By the end of this post, you’ll see how these challenges shaped our thinking — and why we built UniqueSignal to deliver threat intel the way CTI teams actually need it.
This piece isn’t about introducing a new framework but reinforcing the importance of context-driven intelligence. Concepts like the Diamond Model of Intrusion Analysis, the MITRE ATT&CK framework, and the Pyramid of Pain have already shown us that atomic indicators alone aren’t enough. Instead of focusing on individual IOCs, thinking in terms of IOC Building Blocks—clusters of related indicators will provide us pathway for meaningful context.
A single IOC from a sandboxing report doesn’t necessarily indicate a true or false positive, and unactionable. An IP address or a hash alone is short lived and easy to change for attackers, and tells us little about adversary behavior, infrastructure reuse, or the threat’s broader impact. So we’d like to move beyond individual indicators. Just like puzzle pieces, they form a clearer picture when placed in context. This approach strengthens detection as well as hunting confidence.
The industry has been advocating for contextual intelligence over atomic indicators for years. Some key frameworks, followed by security tools, that is reflecting this shift:
A widely accepted format for threat intelligence sharing is STIX (Structured Threat Information eXpression). However, its real power is only realized when its components are used together (e.g. relationship objects, SROs).
For example, consider an IP address extracted, observed to be C2 address of a payload:
This association-first approach is at the heart of IOC Building Blocks.
Image: UniqueSignal STIX structure
Over the past 11 years, we’ve seen how customers use our sandbox beyond just analysis — as a reliable source of threat intelligence. Many teams have already built pipelines where samples go in, and IOCs come out.
This inspired us to take it further.
We’re now excited to share that we’ve officially launched our new Threat Intelligence Feed, built on top of our evasion-resistant sandbox foundation. It’s delivered via STIX 2.1 over TAXII, integrates easily with tools that support open standards, and brings together everything seen during dynamic analysis:
During development, we worked closely with dozens of customers — large enterprises and government CTI teams — to refine this feed. Their feedback helped us sharpen our post-processing, add an enrichment layer, and focus on delivering truly actionable intel, not just raw observables.
On one end: the sample. On the other: contextual intelligence.
It may sound simple, but we’ve learned that turning raw sandbox data into useful intelligence takes iteration, exploration, and a shared effort. Some teams are far along. Others are just getting started. Either way, this process of building contextual blocks is foundational — and it’s exactly what our new feed is designed to support.
After hundreds of feedback calls, we’ve built something we believe truly serves CTI teams — filtering out the noise, keeping the context, and staying true to open standards for correct delivery.
We’d love for you to try it out.
Early adopters get 60 days of free access.
Just drop us a note — or reach out to your account manager to get started.