Going from Nation State Malware Sample to MITRE ATT&CK Techniques in Under 5 Minutes
Description
This edition of #TechTalkTuesday shows how to quickly go from a malware sample in a threat intelligence report to the associated MITRE ATT&CK techniques. The MITRE ATT&CK techniques gained through this approach help your threat hunting efforts through the identification of behaviors you can tie to various host and network data sources.