Chapter 9: Using Kibana to Pivot Through Data to Find Adversaries
Now that we've learned about the individual apps within Kibana, introduced various query languages, experimented with visualizations and dashboards, and explored security solutions, we can begin to stitch various data sources together to move beyond detection to identify how an adversary got inside the endpoint and what the goal of their intrusion was. This is extremely helpful when looking at operational and strategic intelligence assessments, as discussed in Chapter 1, Introduction to Cyber Threat Intelligence, Analytical Models, and Frameworks.
In this chapter, you'll learn how to use timelines in the Security app, use observations to connect network and endpoint data, and create detection logic using information derived from previous observations.
In this chapter, we'll go through the following topics:
- Connecting events with a timeline
- Using observations to perform targeted hunts
- Generating...