- Anand R Menon
- Jul 13
- 6 min read

MITRE ATT&CK Framework is one of the most popular methodologies in cybersecurity in the past few years. Cybersecurity tools come integrated with it, cybersecurity leaders talk about it and expect their teams to know and leverage it in their day-to-day operations. Cybersecurity is an ever-changing field where threat actors are coming up with new strategies and techniques every single day to bypass security defenses and achieve their objectives. Attacker tradecrafts are widely reported and researched upon by various news agencies, threat intelligence teams and independent researchers around the world. For any cyber-defender, this "body of work" is a vast database which they can leverage to strengthen their operations. This threat research data combined with an actionable knowledge of MITRE ATT&CK Framework can take their SOC operations to the next level. The objective of this write-up is to help them achieve this objective by introducing the relevant concepts and explaining the process in a step-by-step manner.
Part 1: Attack Data Collection
As a SOC Analyst or Blue Team member, one of the most valuable information to have is the real-world attack data, including the various attack types, the extent and impact of these attacks. What are some effective ways to collect this critical data?
Cybersecurity News Websites: The Hacker News, Bleeping Computer, Cyber Security News, Cyware etc. are leading websites for collecting cyberattack and vulnerability data. The advantage with these websites is that they never miss the major attacks and will be the firsts to report them. Apart from that, they summarize the attack data into simple, easy-to-understand language which is suited for cybersecurity beginners and experienced alike. But one thing to note is that, these websites are majorly cybersecurity news-reporting websites. In their articles, you'll also find links towards the original research(performed by other companies or individuals), so make sure not to miss the original research articles as well, in order to develop a deeper understanding of an attack or vulnerability.
RSS Feeds: Going to each and every news website and gathering information might become a strenuous and time-consuming process and this is where the RSS Feeds will come handy. RSS Feed is a web feed format which helps to subscribe to websites and receive new content from them without having to constantly visit those websites. Feedly is a very helpful RSS Feed app. The advantage here is that you get all the major cybernews and updates from your favourite websites in one place.
Newsletters: Cybersecurity Newsletters are a great way to collect the latest attack data without putting too much effort to gather the info. My personal favourite in this area is SANS NewsBites newsletter. It's a semi-weekly(twice a week) newsletter(comes straight to your inbox if subscribed!) which covers the major cyberattacks and vulnerabilities for the week. The best part is, it's concise and to-the-point, contains commentaries about the news piece from SANS experts(which helps understand the historical context and importance of the news) and provides links from cybersecurity news websites for additional research.
Cyber-news Podcasts: Cyber-news podcasts are a great way to constantly be updated about the latest news. Podcasts provide a unique advantage that they can be added in along with your routine tasks, be it morning/evening walks, cooking or driving. SANS Stormcast is one the best cybernews podcasts out there. Rather than just news reporting, there are lots of insights, recommendations and discussions included in this one. At the same time, it's short and precise. CISO Series Cyber Security Headlines is another good option to gather the latest attack information.
Part 2: MITRE ATT&CK Framework
MITRE ATT&CK Framework is one of the most comprehensive and directly actionable frameworks we have within the Cybersecurity domain. ATT&CK Framework consists of 14 Tactics, and each Tactic has multiple Techniques and Sub-Techniques.
In Simple terms,
Tactics be compared to different stages in the Cyber Kill Chain. These are basically the goals or objectives of the attackers. Examples of Tactics are Initial Access, Lateral Movement, Exfiltration etc.
Techniques are how that goal or objective can be achieved by the attacker, eg. Initial Access into a target environment can be achieved through Spearphishing, Bruteforce etc.
Then there are Procedures, which are real-world instances(cyberattacks) where specific techniques have been used by threat actors to compromise environments. Procedures are one of the most overlooked components within ATT&CK Framework. A detailed study of procedures will help Blue Team and Red Team members understand real-world attacks in-depth.
Each Technique page within MITRE ATT&CK website contains detailed Detection and Mitigation steps which is invaluable data to the Blue Team. Detection ideas mentioned in ATT&CK page can be used in combination with the analytics rules detailed in MITRE CAR website(Another wonderful initiative from MITRE) to develop detection rules for your SIEM tool. A major point worth noting is, most of the high-profile attacks are not limited to just 1 or 2 tactics/techniques but are a combination of various tactics and techniques. This might even extend, in certain cases, to all the 14 tactics in the ATT&CK Framework. No matter how sophisticated the adversary is, this framework provides cybersecurity teams with a logical pathway to investigate and uncover the trajectory of the attacker.
Part 3: Extract Relevant Threat Intel from Real Attack Data
In the previous two sections, we discussed the collection of real attack data and the concepts of MITRE ATT&CK Framework. But as obvious as it is, no cyberattack news or frameworks are useful unless we can derive actionable intel from them in order to protect corporate environments. Let us explore some effective ways to extract relevant threat intel from real attack data.
Cyberattack News -"Reading between the lines": We've already discussed how to collect important Cybersecurity news and attack-related data. Now, while reading such news articles(especially from news-reporting websites like The Hacker News, Bleeping Computer etc.), it's important to not just do peripheral reading but try to go deep and understand the attacker's killchain stages, tactics, techniques and attacker path.
In-Depth Threat Research Reference: There are different threat intel teams disseminating in-depth threat research information regularly.
Some of the ones which shouldn't be missed are:
1. Collecting IOCs
The above-mentioned threat research blogs provide attacker IOCs, i.e the IP addresses/Domains/ URLs/Files(hashes) currently in use or has been historically used by threat actors to compromise company environments. Make a note of this valuable information.
2. Collecting TTPs
MITRE TTPs go even deeper than IOCs and track the modus operandi of the attackers. The above-mentioned threat research blogs provide detailed tactics and techniques used by the attackers. Make short notes of the attacker TTPs including tools used, commands run etc.
3. Prevention/Mitigation Recommendations
These threat research articles also provide detailed attack prevention and mitigation recommendations which can be helpful in fortifying your defenses against specific attacks as well as improving your overall security posture.
Part 4: Unleash the Power of Collected Threat Intel with Proactive Threat Hunting
In parts 1 to 3, we explored how to collect real attack data, relevance of MITRE ATT&CK framework and extracting relevant threat intel from the collected attack data. Now, it's time to leverage the collected threat intel to actively hunt the adversaries in your environment. Let's look into some effective ways to perform proactive threat hunting.
Threat Hunting with IOCs: The IP addresses, domains, URLs, file hashes etc. of the malicious actor can be searched in your SIEM tool using the format <field="value">. If the IOC list is long, can be created as watchlists/reference lists and searched accordingly. If there are results for IOCs in the logs, need to take appropriate actions such as blocking IPs, file hashes as well as analyzing further malicious activities connected to those IOCs.
Threat Hunting with "Keywords": Searching with keywords can be a good starting point for TTP hunting. There are certain tools, commands and other attack patterns commonly seen under attacker tactics. For eg. Encoded PowerShell is a common technique used by threat actors to achieve Defense Evasion. Searching with keywords powershell.exe -enc as a regex in raw logs will be helpful to determine encoded PowerShell commands(In Google SecOps, "Legacy Search" can be used for the same). Threat hunting with keywords also helps identify the field-value pairs which will be helpful in the next step.
Developing Threat Hunting Rules: Once keywords are searched upon and field-value pairs identified, threat hunting rules can be developed to further finetune the process. For eg., in Google SecOps, encoded PowerShell commands can be searched using the query:
principal.process.file.full_path = /powershell.exe$/ AND principal.process.command_line =/powershell.exe -enc/
Additional conditions can be added to filter for just malicious encoded PowerShell commands by analyzing the base64 strings. Threat hunting rules can also be made repeatable by saving them as "Saved Searches"(Google SecOps).
"Automate it"-Feedback Loop to Detection Rules: The best part about threat hunting is, it leads us to findings which creates a feedback loop to Detection Rules. Once something malicious has been uncovered during threat hunting, the relevant teams need to be immediately informed to take corrective actions. The next logical step is to automate the findings using Detection Rules so that the malicious actor's movements are alerted in future even when the threat hunting for the actor is not active at that point of time.
If threat actors are refining their TTPs with each passing day, we as defenders need to be one step ahead and be able to track them down and defeat their purpose. With the pattern they follow and the evidence they leave behind, in a way, they are helping us develop our knowledge base which will in-turn be used against them. The practices mentioned in this article are intended to help you in your fight against their might!