Infrastructure Pivot Log
Purpose
Document accepted and rejected infrastructure pivots with link strength and limitations.
Fields
- pivot_id: Unique pivot identifier.
- seed: Initial IOC or artifact.
- pivot_type: Passive DNS, certificate, ASN, URL path, favicon, malware config, or telemetry.
- related_indicator: Candidate related indicator.
- time_window: First/last seen or relevant date window.
- link_strength: Weak, moderate, or strong.
- decision: Accepted, rejected, or pending.
- reason: Why the decision was made.
- limitations: False-positive and coverage risks.
Example Values
pivot_id: PIV-002
seed: example[.]com
pivot_type: Certificate
related_indicator: update-example[.]com
time_window: 2026-04-01 to 2026-04-08
link_strength: Moderate
decision: Accepted
reason: Shared rare SAN pattern and URL path.
limitations: Attribution remains Unknown.
Quality Gates
- Every pivot has a time window.
- Rejected pivots are preserved.
- Link strength is justified.
- Attribution is not inferred from weak pivots.
Common Failure Modes
- Graph sprawl.
- No rejected-pivot record.
- No false-positive discussion.
Practical Workflow
- Create the artifact only after the intelligence requirement or decision is clear.
- Fill required fields before writing narrative prose.
- Attach evidence labels, source references, confidence, and limitations.
- Review with the intended consumer.
- Update the artifact when evidence, telemetry, or decision context changes.
Analyst Checklist
- Is the consumer defined?
- Are required fields complete?
- Are claims source-backed or marked Gap?
- Is confidence justified?
- Are limitations explicit?
- Is there a next action or owner?
Cross-Links
References
Required vs Optional Fields
Required: seed, pivot type, related indicator, time window, link strength, decision, reason, limitations.
Optional: tool used, screenshot/hash of result, analyst owner, expiry date.
Pass / Fail Example
Pass: A certificate pivot is accepted because of rare SAN pattern plus matching URL path in the same week.
Fail: Every domain on the same ASN is treated as actor infrastructure.
Complete Filled Example
pivot_id: PIV-014
seed: login-example[.]com
pivot_type: Certificate + URL path
related_indicator: auth-example[.]com
time_window: 2026-05-10 to 2026-05-14
link_strength: Moderate
decision: Accepted as candidate cluster, not attribution.
reason: Same cert issuance window and same uncommon path structure.
limitations: Could be shared phishing kit; actor remains Unknown.