Threat Hunting
Copy
Query: "What are the latest TTPs used by APT29?"
Use: Research advanced persistent threats
Result: Recent campaigns, techniques, detection methods
Malware Analysis
Copy
Query: "Analyze the infection chain of Emotet malware"
Use: Understand malware behavior and propagation
Result: Detailed kill chain, C2 infrastructure, defense strategies
Forensic Investigation
Copy
Query: "What artifacts does ransomware typically leave on a system?"
Use: Guide digital forensics investigations
Result: File locations, registry keys, network indicators
