Understanding the analysis process
One of the most important skills for CTI analysis is pivoting. Pivoting allows an analyst to use one or more identified indicator(s) as an anchor point and search through various data sources for events and flows related to those indicators. A simplified threat analysis process is shown in the following diagram, and we use that throughout the chapter to standardize our tasks:
The final objective is to complete the Cyber Kill Chain stages by progressively identifying the elements of the Diamond model. Each task of the analysis process aims to identify artifacts that will help us reach our objective.
Given any threat scenario, the following steps must be taken:
- Identify an indicator: An indicator can be an Internet Protocol (IP) address, domain name, hash value, Uniform Resource Locator (URL), or even something such as a bank account number, a name, and an email address...