Get More Context for Your Analysis with TTPs

Moran Shmilovitshe

Learn more about how Intezer works here and its automated incident response process, which provides you with TTPs and so much more.

Classifying a threat is just one step in a SOC analyst’s investigation. You know it’s malicious but what does it do?

Steal credentials? Exfiltrate data? Lateral movement? These are just some examples. As a SOC analyst, it’s important to understand what the file is capable of in order to craft your response.

To help with this, thrilled to launch our latest Intezer feature: Tactics, Techniques, and Procedures (TTPs)! This feature helps SOC analysts quickly understand malware behavior and capabilities, to assess the risk and better tailor the response. When faced with simultaneous threats, TTPs also provide tips on which to prioritize first based on potential impact to the company. We’re helping security teams answer all the questions they need to automate end-to-end malware investigations, under one platform.

Automatically Mapping TTPs to MITRE ATT&CK

This feature is powered with CAPA, the open-source library by Mandiant. CAPA works statically on the assembly level, identifying recognizable patterns and API calls in executable files to explain what they are trying to do.

Intezer Analyze detects TTPs by scanning files statically with CAPA and matching the assembly to a collection of predefined rules covering the MITRE ATT&CK framework. For example, it might suggest the malicious file is a backdoor capable of installing services or that it relies on HTTP to communicate. Static TTPs are available for files including automatically unpacked filesendpoint analysis for memory forensics, and memory dump analysis. As part of utilizing CAPA, our research team will also be contributing to the project by adding community rules based on our unique genetic code analysis insights.

Let’s look at an example.

1. Intezer Analyze detects this Ryuk ransomware sample. 

Ryuk  2021

 2. Click on TTPs. A list of capabilities and the relevant TTPs are returned telling you what this program can do based on the MITRE ATT&CK Matrix. Intezer found 34 capabilities. The malware can perform actions such as process injection to remain hidden in the network, collect data from the clipboard, or query the registry to collect info about the victim’s machine. 

pasted image 0 6

 3. That’s it. You have relevant insights about the TTPs to assess the risk and potential impact. I encourage you to give this new feature a try. If you don’t have a file to analyze at the moment, visiting the Intezer Analyze homepage is a great place to start. You can choose from the latest top community uploads, or type a malware family in the search engine and grab a file from its related samples detected by code reuse.

TTPs for Fast Incident Response

TTPs are supported for PE files and other files collected and analyzed by Intezer:

  • Users can see TTPs linked to specific/relevant parts of the code.
  • Intezer’s genetic analysis shows which malware family a capability was previously seen, if it’s borrowed from a library, or part of unique code.

Moran Shmilovitshe

Moran leads the product lifecycle of Intezer Analyze. She formerly was a team leader in the Israeli Defense Force.

In this article

Share this article
Recommended Blogs
ASL@Nasdaq blog post cover
5MIN READ

AI SOC Live at Nasdaq: Real conversation about modern security operations

The SOC is broken. Not because of a lack of talent or effort, but because human capacity does not scale. At AI SOC Live NASDAQ, we are bringing together the security leaders who are doing something about it.
blog cover for AI SOC: When to buy and when to DIY
5MIN READ

AI SOC: When to buy and when to DIY

The question worth asking isn't "build or buy?" It's a more precise one. Which parts of this problem are worth your engineers' time, and which parts aren't?
Illustration of multiple risk gauge meters representing varying security threat levels
5MIN READ

AI SOC for teams outgrowing MDR

For teams that have outgrown their MDR, the answer isn’t a better MDR. It’s a different operating model.