Creating and sharing IOCs
Let's consider the intrusion analysis performed in Chapter 10, Threat Modeling and Analysis - Practical Use Cases, with the simplified kill chain discovery action shown in the following figure. Some of the other indicators extracted during the analysis included the executable.1640.exe
hash value, 12cf6583f5a9171a1d621ae02b4eb626
, and the resoh.ru
domain:
Sharing threat intelligence makes the defense against cyber threats more effective. After a successful analysis, a CTI analyst should select the correct format and platform to disseminate the results internally and externally. This section looks at IOC sharing and the use of YARA to detect malicious traffic.
Use case one – developing IOCs using YARA
YARA is common for malware detection and traffic monitoring. Its structure was introduced in Chapter 14, Threat Intelligence Reporting...