Going from Nation State Malware Sample to MITRE ATT&CK Techniques in Under 5 Minutes


This edition of #TechTalkTuesday shows how to quickly go from a malware sample in a threat intelligence report to the associated MITRE ATT&CK techniques. The MITRE ATT&CK techniques gained through this approach help your threat hunting efforts through the identification of behaviors you can tie to various host and network data sources.

Leave a Comment

Your email address will not be published. Required fields are marked *

Scroll to Top