Section 3: Reporting and Weaponizing Your Findings
Section 3 of Malware Analysis Techniques focuses on practical, example-driven applications of the findings from previous sections. This includes learning how to map tactics to known kill chain frameworks, writing concise and legible C-level and technical reports, and defending your network with IOCs stolen from the malware itself.
This part of the book comprises the following chapters:
- Chapter 9, The Reverse Card – Weaponization of IOCs and OSINT for Defense
- Chapter 10, Malicious Functionality – Mapping Your Sample's Behavior against MITRE ATT&CK