Digital Forensics

Responsible for analyzing digital evidence from computer security incidents to derive useful information in support of system and network vulnerability mitigation.

  • T0167: Perform file signature analysis
  • T0168: Perform data comparison against established database
  • T0172: Perform real-time forensic analysis (e.g., using Helix in conjunction with LiveView)
  • T0173: Perform timeline analysis
  • T0179: Perform static media analysis
  • T0182: Perform tier 1, 2, and 3 malware analysis
  • T0397: Perform Windows registry analysis
  • T1020: Determine the operational and safety impacts of cybersecurity lapses
  • T1051: Set up a forensic workstation
  • T1084: Identify anomalous network activity
  • T1090: Determine best methods for identifying the perpetrator(s) of a network intrusion
  • T1102: Identify intrusions
  • T1103: Analyze intrusions
  • T1104: Document what is known about intrusions
  • T1118: Identify vulnerabilities
  • T1119: Recommend vulnerability remediation strategies
  • T1120: Create forensically sound duplicates of evidence
  • T1121: Decrypt seized data
  • T1159: Create technical summary of findings reports
  • T1175: Determine if digital media chain or custody processes meet Federal Rules of Evidence requirements
  • T1191: Determine relevance of recovered data
  • T1199: Identify digital evidence for analysis
  • T1253: Perform dynamic analysis on drives
  • T1260: Perform real-time cyber defense incident handling
  • T1282: Prepare digital media for imaging
  • T1301: Report forensic artifacts indicative of a particular operating system
  • T1322: Capture network traffic associated with malicious activities
  • T1323: Analyze network traffic associated with malicious activities
  • T1324: Process digital evidence
  • T1325: Document digital evidence
  • T1370: Collect intrusion artifacts
  • T1371: Mitigate potential cyber defense incidents
  • T1372: Advise law enforcement personnel as technical expert
  • T1381: Scan digital media for viruses
  • T1382: Mount a drive image
  • T1383: Utilize deployable forensics toolkit
  • T1387: Validate intrusion detection system alerts
  • T1407: Correlate threat assessment data
  • T1486: Process forensic images
  • T1487: Perform file and registry monitoring on running systems
  • T1488: Enter digital media information into tracking databases
  • T1489: Correlate incident data
  • T1490: Prepare cyber defense toolkits
  • T1510: Preserve digital evidence
  • T1607: Recover information from forensic data sources
  • T1617: Prepare cyber defense reports