Process of Analyzing Json Mime File Download Json Mime
14
Detect the First Chain!
15
Email Campaign Featuring a PDF Attachment
16
Extract URL from PDF
17
CVE-2017-0199 Malicious RTF Document
18
Use Known Tools for Analysis
19
Apply Foremost on the File!
20
Malicious Extracted Files
21
Introducing Yalda!
22
Yalda Framework
23
Data Storage File Type
24
Applying Quality Control
25
Conclusion
26
How to use Yalda
27
Code is available at Fidelis gitHub
Description:
Learn to automate bulk intelligence collection for cybersecurity analysis in this BSidesCharm 2017 conference talk. Explore when and what to automate in data mining processes, focusing on extracting valuable information from malware files, emails, and various document types. Discover techniques for finding critical data in large datasets, preparing result checklists, and considering database integration. Follow along as the speaker demonstrates manual analysis methods, extracts malicious domains from different file formats, and analyzes email campaigns with suspicious attachments. Gain insights into using known tools for analysis, including Foremost for file extraction. Get introduced to the Yalda framework for data storage and quality control in automated intelligence gathering. Access the code on the Fidelis GitHub repository to implement these automation techniques in your own cybersecurity workflows.