T1583.002 is a blue team lab that falls under the Threat Intel category and will cover the following subjects: MISP, Resource Development, Initial Access, Command and Control.
Learning Objectives
Analyze a malware campaign using MISP to identify communication patterns and extract key indicators of compromise (IOCs), including malware family and file hashes.
Categories: Threat Intel.
MITRE ATT&CK Tactics: Resource Development, Initial Access, Command and Control.
Tools: MISP.
Difficulty: easy.
This website uses cookies to ensure you get the best experience on our
website.
Learn more