Investigation
IN-WRL-002

Digital Evidence Analysis

Responsible for identifying, collecting, examining, and preserving digital evidence using controlled and documented analytical and investigative techniques.

  • T0167: Perform file signature analysis
  • T0168: Perform data comparison against established database
  • T0172: Perform real-time forensic analysis (e.g., using Helix in conjunction with LiveView)
  • T0173: Perform timeline analysis
  • T0179: Perform static media analysis
  • T0182: Perform tier 1, 2, and 3 malware analysis
  • T0193: Process crime scenes
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1051: Set up a forensic workstation
  • T1090: Determine best methods for identifying the perpetrator(s) of a network intrusion
  • T1102: Identify intrusions
  • T1103: Analyze intrusions
  • T1104: Document what is known about intrusions
  • T1120: Create forensically sound duplicates of evidence
  • T1159: Create technical summary of findings reports
  • T1175: Determine if digital media chain or custody processes meet Federal Rules of Evidence requirements
  • T1191: Determine relevance of recovered data
  • T1199: Identify digital evidence for analysis
  • T1207: Collect documentary or physical evidence of cyber intrusion incidents, investigations, and operations
  • T1253: Perform dynamic analysis on drives
  • T1282: Prepare digital media for imaging
  • T1301: Report forensic artifacts indicative of a particular operating system
  • T1322: Capture network traffic associated with malicious activities
  • T1323: Analyze network traffic associated with malicious activities
  • T1324: Process digital evidence
  • T1325: Document digital evidence
  • T1332: Produce incident findings reports
  • T1333: Communicate incident findings to appropriate constituencies
  • T1370: Collect intrusion artifacts
  • T1371: Mitigate potential cyber defense incidents
  • T1381: Scan digital media for viruses
  • T1382: Mount a drive image
  • T1383: Utilize deployable forensics toolkit
  • T1486: Process forensic images
  • T1510: Preserve digital evidence
  • T1516: Detect concealed data
  • T1542: Document original condition of digital evidence
  • T1607: Recover information from forensic data sources