Handling Threat Intelligence: Techniques of Consuming and Creating Threat Intelligence
Abstract
To prevent APT actors from conducting attacks and to avoid similar attacks, it is important to collect and analyze various information on attack groups and its methods, and to use this information to develop “threat intelligence” that can be used for prevention and detection. It is also possible to promote early warning by analyzing the attack methods and sharing created threat intelligence within and outside the organization.
You may think of malware analysis, vulnerability analysis, and forensic analysis when you talk about attack method analysis. However, how do you use the information gained from analysis to prevent and detect attacks? In this workshop, you will learn how to analyze and understand the attack methods used by actors, based on the information uncovered through malware analysis, forensic analysis, etc., using the MITRE ATT&CK framework and other methods. In addition, you will learn about techniques for creating IOCs useful for prevention and detection, how to apply them to threat hunting, penetration testing, and detection engineering, and consideration of countermeasures.
This workshop covers two aspects of threat intelligence for those new to the field. First, we will introduce the theoretical foundations of threat intelligence and explain key concepts such as definitions and types of intelligence, and the intelligence cycle. Second, we will focus on techniques for generating and utilizing threat intelligence. Specifically, you will learn about Tactical Intelligence, which generates and applies Indicators of Compromise (IOCs), and Operational Intelligence, which analyzes attackers’ tactics, techniques, and procedures (TTPs) based on MITRE ATT&CK framework. You will also learn about techniques that can be applied to enhance security operations, such as threat hunting, purple teaming, and detection engineering, based on the knowledge you acquire.
Speaker
Tomohisa Ishikawa
Tatsuya Daitoku
Hiroyuki Tomiyama
Requirements
- Laptop with Internet access
Advance Preparation
The following tools must be available on the laptop:
- Web browser with no viewing restrictions, etc.
- Spreadsheet application (e.g. Microsoft Excel)
- SSH and RDP connections
Skills
- Ideally, you should be able to use basic Linux commands (as you will be asked to execute some commands on the Linux instance).
Notes
This talk is not translated into English.