Table of Contents
Preface
Part 1: Fundamental Theory
1
Cybercrime, APT Attacks, and Research Strategies
Why malware analysis?
Malware analysis in collecting threat intelligence
Malware analysis in incident response
Malware analysis in threat hunting
Malware analysis in creating detections
Exploring types of malware
A short history of malware development
Malware categories
Naming conventions
The MITRE ATT&CK framework explained
Basic terminology
Enterprise Matrix
APT and zero-day attacks and fileless malware
APT attack
Zero-day attack
Fileless malware
Choosing your analysis strategy
Understand your audience
Answer your audience’s questions
Define your goals
Avoid unnecessary technical details
Example structures
Typical analysis workflow
Setting ...
Get Mastering Malware Analysis - Second Edition now with the O’Reilly learning platform.
O’Reilly members experience books, live events, courses curated by job role, and more from O’Reilly and nearly 200 top publishers.