Building and understanding adversaries' campaigns
Let's assume that you have performed a threat or intrusion analysis. Two of the questions that analysts ask are: How do we name the threat actor? And How do we link them to a campaign? Campaign building and tracking are challenging, especially for newly detected threats or campaigns. Building an adversary campaign relies on analysts' experience and threat and intrusion analyses conducted over time. However, the foundation of adversary campaign extraction is built on the following:
- Past intelligence analysis: To extract adversary names and campaigns, you should look at threat analysis or intrusion analysis over time. If your organization is new to CTI, you might not have the required data or reports on past intrusions. In that case, you need to focus on the next bullet point. However, as you grow by performing more analyses, you start building your threat intelligence corpus.
- External intelligence analysis...