All-Source Analysis

Responsible for analyzing data and information from one or multiple sources to conduct preparation of the operational environment, respond to requests for information, and submit intelligence collection and production requirements in support of intelligence planning and operations.

  • T0167: Perform file signature analysis
  • T0172: Perform real-time forensic analysis (e.g., using Helix in conjunction with LiveView)
  • T0569: Answer requests for information
  • T0685: Evaluate threat decision-making processes
  • T0686: Identify threat vulnerabilities
  • T0698: Facilitate continuously updated intelligence, surveillance, and visualization input to common operational picture managers
  • T0707: Generate requests for information
  • T0718: Identify intelligence gaps and shortfalls
  • T0751: Monitor open source websites for hostile content directed towards organizational or partner interests
  • T0845: Identify cyber threat tactics and methodologies
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1022: Review enterprise information technology (IT) goals and objectives
  • T1030: Estimate the impact of collateral damage
  • T1035: Determine how threat activity groups employ encryption to support their operations
  • T1042: Acquire target identifiers
  • T1046: Assess operation performance
  • T1047: Assess operation impact
  • T1054: Scope analysis reports to various audiences that accounts for data sharing classification restrictions
  • T1055: Determine if priority information requirements are satisfied
  • T1084: Identify anomalous network activity
  • T1085: Identify potential threats to network resources
  • T1118: Identify vulnerabilities
  • T1119: Recommend vulnerability remediation strategies
  • T1489: Correlate incident data
  • T1638: Recommend cyber operation targets
  • T1640: Determine effectiveness of intelligence collection operations
  • T1641: Recommend adjustments to intelligence collection strategies
  • T1642: Advise stakeholders on course of action development
  • T1643: Develop common operational pictures
  • T1644: Develop cyber operations indicators
  • T1645: Coordinate all-source collection activities
  • T1646: Validate all-source collection requirements and plans
  • T1647: Develop priority information requirements
  • T1651: Prepare threat and target briefings
  • T1652: Prepare threat and target situational updates
  • T1661: Assess all-source data for intelligence or vulnerability value
  • T1686: Identify intelligence requirements
  • T1739: Develop intelligence collection requirements
  • T1741: Designate priority information requirements
  • T1762: Modify collection requirements
  • T1763: Determine effectiveness of collection requirements
  • T1765: Monitor changes to designated cyber operations warning problem sets
  • T1766: Prepare change reports for designated cyber operations warning problem sets
  • T1767: Monitor threat activities
  • T1768: Prepare threat activity reports
  • T1770: Report on adversarial activities that fulfill priority information requirements
  • T1772: Identify indications and warnings of target communication changes or processing failures
  • T1775: Prepare cyber operations intelligence reports
  • T1776: Prepare indications and warnings intelligence reports
  • T1792: Assess effectiveness of intelligence production
  • T1793: Assess effectiveness of intelligence reporting
  • T1795: Conduct post-action effectiveness assessments
  • T1798: Provide intelligence analysis and support
  • T1799: Notify appropriate personnel of imminent hostile intentions or activities
  • T1804: Prepare network intrusion reports
  • T1835: Determine if intelligence requirements and collection plans are accurate and up-to-date