Structured hunting (MITRE)
Last updated
Last updated
Lockeed Martin's Cyber Kill Chain is an invaluable resource for threat hunting
Understanding each stage of the process from reconnaissance to actions on objectives helps with identifying what an attacker needs to do for a successful intrusion
Mandiant has a different variation of the kill chain, listing the phases that an attacker must carry out
Any of the previously listed attack life cycles can be picked for threat hunting
After understanding the attack life cycle and the different phases of it, a threat hunter needs to understand the specifics of how an attacker conducts each one of the phases
The MITRE ATT&CK framework provides detailed descriptions of methods by which an adversary can achieve goals for each phase of the attack
Understanding these methods allows a threat hunter to build a structured hunt based on the TTPs for an attack
The Enterprise ATT&CK Matrix lists the Tactics and Techniques in a tabular form for ease of understanding
Tactics represent the "why" of an ATT&CK technique or sub-technique. It is the adversary's tactical goal: the reason for performing an action. For example, an adversary may want to achieve credential access
Techniques represent "how" an adversary achieves a tactical goal by performing an action. For example, an adversary may dump credentials to achieve credential access