Skip to content
This repository was archived by the owner on Dec 11, 2023. It is now read-only.

Commit 1af2370

Browse files
committed
Updated to reflect new ordering
1 parent 404a10c commit 1af2370

2 files changed

Lines changed: 12 additions & 17 deletions

File tree

trainings/detection-training/Data Sources.ipynb

Lines changed: 11 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -270,6 +270,17 @@
270270
" \n",
271271
"FileLink('data_sources.json')"
272272
]
273+
},
274+
{
275+
"cell_type": "markdown",
276+
"metadata": {},
277+
"source": [
278+
"# Overlaying Priorities with Data Sources\n",
279+
"\n",
280+
"The reason we collect data is of course to help us detect attacks, so let's see how the data that we've collected measures up.\n",
281+
"\n",
282+
"How would you do this?"
283+
]
273284
}
274285
],
275286
"metadata": {

trainings/detection-training/Prioritization Scenarios.ipynb

Lines changed: 1 addition & 17 deletions
Original file line numberDiff line numberDiff line change
@@ -41,7 +41,7 @@
4141
"* Powershell: https://attack.mitre.org/techniques/T1086/ \n",
4242
"* NTFS File Attributes: https://attack.mitre.org/techniques/T1096/\n",
4343
"* File Permissions Modification: https://attack.mitre.org/techniques/T1222/ \n",
44-
"* Indicator Blocking: https://attack.mitre.org/techniques/T1054/\n",
44+
"* Indicator Removal from Host: https://attack.mitre.org/techniques/T1070/\n",
4545
"\n",
4646
"*Consider: What extra threat information, in addition to the techniques, would be helpful at building detections?*"
4747
]
@@ -57,22 +57,6 @@
5757
"1. Making sure to have the APT1/APT3 layer in the navigator and the new custom layer in the navigator, hit the plus to create a new layer.\n",
5858
"2. Adjust the formula and scoring so that you get prioritized detections. How would you weight these different sets of intelligence? What are your top techniques?"
5959
]
60-
},
61-
{
62-
"cell_type": "markdown",
63-
"metadata": {},
64-
"source": [
65-
"# Formulate our detection strategy\n",
66-
"\n",
67-
"Let's assume we want to detect the techniques used in the recent Blue Panda campaign. How would we see which techniques we could cover given our data sources?\n",
68-
"\n",
69-
"1. Keeping your prioritization heatmap in the navigator, open up your data sources layer.\n",
70-
"2. Create a new layer that shows you, of your prioritized techniques:\n",
71-
" * Which can be detected given current data collection\n",
72-
" * Where you have gaps.\n",
73-
"\n",
74-
"*Consider: What data sources might you want to add to increase coverage?*"
75-
]
7660
}
7761
],
7862
"metadata": {

0 commit comments

Comments
 (0)