The Process of Mapping from Raw Data

Video Activity
Join over 3 million cybersecurity professionals advancing their career
Sign up with
Required fields are marked with an *
or

Already have an account? Sign In »

Time
2 hours 24 minutes
Difficulty
Intermediate
CEU/CPE
3
Video Transcription
00:00
welcome to module to mapping from raw data
00:03
in Moscow. One. Adam talks about the process of mapping from narrative reporting to attack.
00:07
Now in module two, we'll be talking about leveraging that same process when mapping from raw data, our data from incident response
00:15
So our objectives for this module are learning to identify and research behaviors and raw data. Next, we'll be talking about translating those behaviors into tactics, techniques and sub techniques.
00:25
Finally, we'll practice mapping the raw data with an exercise, and then we'll review a couple of best practices for displaying the attack map data and reports
00:34
moving on to our first lesson 2.1 the process of mapping from raw data.
00:40
So our objectives for less than 2.1 are talking through the mapping process for raw data. We're going to be discussing some of the challenges and advantages of mapping from raw data versus Inari reporting and then reviewing the pros and cons of mapping from the two different data sources.
00:56
So far in this attack, C t. I training, we've been focusing on reporting and intelligence that has already been developed and is outlining what occurred around the adversary behaviors when mapping from raw data, we're going to be performing the analysis of behaviors directly from the source data that informs those type of reports.
01:15
And there are some specific challenges and advantages of mapping from raw data.
01:19
So a key challenge with raw data is that there can be a lot more knowledge necessary to actually come to a point where you can map it to attack.
01:29
So this might include reviewing many more data sources, and it may require just diverse levels of experience.
01:36
Another challenge is that there can be a wide set of potential data that might contain behaviors,
01:40
and this can be data from forensic disk images or from shell commands. It can be our from our own analysis from sandbox detonation or from a number of other data sources coming from incident responders.
01:53
And finally, you might have to be looking at a lot more data overall in order to figure out what the intent and tactic are for the actual behavior
02:01
moving on to the advantages. So a key advantage that there's probably more information available at the procedure level and more detail on the actual data. You're also not reinterpreting someone else's analysis,
02:14
You're deciding yourself how to assess the adversary activities.
02:19
Finally, in raw data, it really enables you to increase your understanding of different data sources and potentially using different kinds of tools to gain additional information on adversary behaviors.
02:30
So throughout the rest of this module, we're going to be following the same mapping process that was covered in module one.
02:37
We're going to be walking through each of these steps to identify research and translate those behaviors into the relevant tactic, technique or sub technique.
02:45
So with each of the steps and the attack mapping process, there can be a lot of variants between map and the two types of information to attack. And so we're gonna be walking through some of the pros and cons of mapping from the two sources,
02:57
starting with Step one, finding the behavior
03:00
for raw data. If you're actually looking at data and the information coming from adversary activity,
03:05
a lot of it can be a behavior
03:07
now. That's not to say that everything an attack is an attack technique.
03:10
Is Adam discussed in module one? Attack doesn't include every possible behavior.
03:15
A narrative reporting the behaviors might be buried in a lot of content and hidden among IOC s or distributed throughout the report.
03:23
For Step two researching behavior with raw data, you might have to work across multiple domains and sources to actually understand the behaviors. Or you might have to review multiple data types simultaneously.
03:36
An advantage is that the activity might be recognized procedure as we discussed. And this can help us map directly to a technique or sub technique.
03:46
A narrative reporting There might be enough intelligence and related context to really understand their behavior,
03:53
but there also might be some lost detail that wasn't included in the report
03:57
for Step three. As we translate the behavior into a tactic,
04:00
it might take a significant level of domain knowledge and expertise to understand adversary activity and intent and raw data,
04:08
whereas a narrative reporting this might already be outlined by the report author, where they have speculated about what the intent is for the behaviors
04:17
for Step four and raw data. If we've already found a procedure that goes straight to a technique or sub technique
04:24
as we mentioned, this could be relatively simple.
04:26
This might also require a really deep understanding of the specific data type in order to understand how that activity was accomplished.
04:33
In the case of narrative reporting, it might be as simple as a text match with something we previously map to attack or procedures already an attack. But there also might be a lack of necessary detail to indicate what the technique is.
04:46
Finally, with Step five comparing your results to other analysts.
04:51
So collaboration with other analysts is really important with raw data to ensure that all the different data sources you're pulling in are covered with the appropriate expertise.
05:00
A narrative reporting this collaboration is key to helping us recognize and mitigate those user biases.
05:08
So unless I want to 0.1, we just talked about mapping raw data to attack and discuss some of the challenges. Some of the advantages of mapping from raw data compared to nearly reporting,
05:17
um, and that includes a more advanced and diverse skill set might be required for raw data. But there's likely more information at the procedure level, and you won't be reinterpreting someone else's analysis.
05:29
We also walked through some pros and cons of mapping from each source based on the attack mapping process.
05:34
In less than 2.2, we're gonna be diving into identifying and researching the behaviors
Up Next