SlideShare a Scribd company logo
3
Most read
6
Most read
11
Most read
PRACTICAL
APPLICATION OF
MITRE ATT&CK:
REAL WORLD USAGE
IN A CORPORATE
ENVIRONMENT
Marcelle Lee
ATT&CKcon 5.0
22 October 2024
ABOUT MARCELLE
• Principal InfoSec Engineer & Threat Research Lead @ Equinix
• Cyberjutsu Board of Directors
• Packet nerd
• CTF builder and player
• Career changer – a dozen or so years in cyber now
• Mom of boys (grown and gone) and a couple of adoptees
(grown and not gone), chickens, a dog, a cat, and some fish
• @marcellelee on most socials
HOW WE USE ATT&CK AT EQUINIX
• Research: breaking down TTPs to better understand the threat
• Threat hunting and detection engineering: searching for TTPs in our
systems
• Reporting: sharing with stakeholders
• Kill chain analysis: analyze breaches and attacks for lessons learned
• Security controls gap analysis: identify where gaps may exist based on
identified TTPs
• Integration into research tools: mapping activity to the framework
RESEARCH
• Research is driven by stakeholder priority
intelligence requirements (mostly)
• Continual cycle of identifying relevant
TTPs used by threat actors and assessing
corporate exposure
• Source is typically OSINT, trusted third-
parties, and internal telemetry
• We want to know the details for each
attack phase where possible
THREAT HUNTING AND DETECTION ENGINEERING
• TTPs of interest are
identified
• Map to ATT&CK if not
already done
• Evaluate existing
detection rules for
coverage
• Deploy additional rules
as needed
• Write customer rules to
cover detection gaps
REPORTING
• Analyzed TTPs are shared with stakeholders via internal intel reports
KILL CHAIN ANALYSIS
• TTPs are analyzed and presented in kill chain format
SECURITY CONTROLS GAP ANALYSIS
• Kill chain analysis is leveraged to assess security control coverage
INTEGRATION INTO RESEARCH TOOLS
• Any.run example
INTEGRATION INTO RESEARCH TOOLS
• VirusTotal example
QUESTIONS?
Marcelle Lee
marcelle@marcellelee.com

More Related Content

PDF
Cyber Threat Hunting Workshop.pdf
PDF
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
PDF
Process asset library as process improvement and knowledge sharing tool
PDF
Unit 6_Introduction_Phishing_Password Cracking.pdf
PDF
Fish processing plant Sri Lanka
PDF
MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...
PPTX
Women in fisheries status,role and impact in future
PDF
Unit 3_Private Key Management_Protection.pdf
Cyber Threat Hunting Workshop.pdf
BSidesLV 2018 - Katie Nickels and John Wunder - ATT&CKing the Status Quo
Process asset library as process improvement and knowledge sharing tool
Unit 6_Introduction_Phishing_Password Cracking.pdf
Fish processing plant Sri Lanka
MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...
Women in fisheries status,role and impact in future
Unit 3_Private Key Management_Protection.pdf

Similar to Practical Application of MITRE ATT&CK: Real World Usage in a Corporate Environment - Marcelle Lee (20)

PDF
Birds of a Feather: The Evolution of Threat Actor Prioritization, Gap Analysi...
PPTX
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
PDF
Cyber Threat Hunting Workshop.pdf
PPTX
PEARC17: Workshop on Trustworthy Scientific Cyberinfrastructure. Cybersecurit...
PDF
Using the MITRE ATT&CK framework to analyze real-world cyberattacks
PPTX
Cyber Threat Hunting Workshop
PPTX
My Keynote from BSidesTampa 2015 (video in description)
PDF
KringleCon 3 Providing Value in Offensive Security
PPTX
CyberOps.pptx
PDF
PETRAS Hub Overview
PPTX
How To Turbo-Charge Incident Response With Threat Intelligence
PDF
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
PDF
How To Turbo-Charge Incident Response With Threat Intelligence
PDF
Careers in Cyber Security
PDF
OpenText Threat Hunting Service
PDF
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
PPTX
Proactive Approach to OT incident response - HOUSECCON 2023
PDF
Responsible AI & Cybersecurity: A tale of two technology risks
PDF
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
PPTX
Become a Leader in AI with an Artificial Intelligence Certification Course in...
Birds of a Feather: The Evolution of Threat Actor Prioritization, Gap Analysi...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
Cyber Threat Hunting Workshop.pdf
PEARC17: Workshop on Trustworthy Scientific Cyberinfrastructure. Cybersecurit...
Using the MITRE ATT&CK framework to analyze real-world cyberattacks
Cyber Threat Hunting Workshop
My Keynote from BSidesTampa 2015 (video in description)
KringleCon 3 Providing Value in Offensive Security
CyberOps.pptx
PETRAS Hub Overview
How To Turbo-Charge Incident Response With Threat Intelligence
The DETER Project: Towards Structural Advances in Experimental Cybersecurity ...
How To Turbo-Charge Incident Response With Threat Intelligence
Careers in Cyber Security
OpenText Threat Hunting Service
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
Proactive Approach to OT incident response - HOUSECCON 2023
Responsible AI & Cybersecurity: A tale of two technology risks
The death of enterprise security as we know it - Pukhraj Singh - RootConf 2018
Become a Leader in AI with an Artificial Intelligence Certification Course in...
Ad

More from MITRE ATT&CK (20)

PDF
Next-Gen Threat-Informed Defense: Human-Assisted Intelligent Agents - Rajesh ...
PDF
Using ATT&CK and MITRE CTID’s StP Frameworks to Assess Threat Detection Resil...
PDF
Bridging the Gap: Enhancing Detection Coverage with Atomic Red Team, Sigma, a...
PDF
SaaSy ATT&CK – Practical ATT&CK usage for SaaS-based Telemetry - Aaron Shelmire
PDF
I'll take ATT&CK techniques that can be done for $1000, Alex. - Ben Langrill
PDF
This is why we don’t shout “Bingo”: Analyzing ATT&CK Integration in Endpoint ...
PDF
Every Cloud Has a Purple Lining - Arun Seelagan
PDF
Confession: 3 Things I Wish I Knew About MITRE ATT&CK When I Was an FBI Profi...
PDF
ATT&CKcon 5.0 Keynote - From Ticket Closers to Practitioners- How Great Secu...
PDF
ATT&CKcon 5.0 Lightning Talks - Various Speakers
PDF
MITRE ATT&CK Updates: Defensive ATT&CK - Lex Crumpton
PDF
MITRE ATT&CK Updates: Enterprise - Casey Knerr
PDF
MITRE ATT&CK Updates: CTI - Path Forward - Joe Slowik
PDF
MITRE ATT&CK Updates: Software - Jared Ondricek
PDF
State of the ATT&CK 2024 - Adam Pennington
PDF
Sources of ATT&CK: A Bibliographic Journey through Enterprise ATT&CK - Robert...
PDF
Updates from The Center for Threat Informed Defense - Jon Baker
PDF
Go Go Ransom Rangers: Diving into Akira’s Linux Variant with ATT&CK - Nicole ...
PDF
ATT&CK From Basic Principles - Tareq AlKhatib
PDF
Lifecycle-Aware Power Side-Channel Malware Detection - Alexander Cathis
Next-Gen Threat-Informed Defense: Human-Assisted Intelligent Agents - Rajesh ...
Using ATT&CK and MITRE CTID’s StP Frameworks to Assess Threat Detection Resil...
Bridging the Gap: Enhancing Detection Coverage with Atomic Red Team, Sigma, a...
SaaSy ATT&CK – Practical ATT&CK usage for SaaS-based Telemetry - Aaron Shelmire
I'll take ATT&CK techniques that can be done for $1000, Alex. - Ben Langrill
This is why we don’t shout “Bingo”: Analyzing ATT&CK Integration in Endpoint ...
Every Cloud Has a Purple Lining - Arun Seelagan
Confession: 3 Things I Wish I Knew About MITRE ATT&CK When I Was an FBI Profi...
ATT&CKcon 5.0 Keynote - From Ticket Closers to Practitioners- How Great Secu...
ATT&CKcon 5.0 Lightning Talks - Various Speakers
MITRE ATT&CK Updates: Defensive ATT&CK - Lex Crumpton
MITRE ATT&CK Updates: Enterprise - Casey Knerr
MITRE ATT&CK Updates: CTI - Path Forward - Joe Slowik
MITRE ATT&CK Updates: Software - Jared Ondricek
State of the ATT&CK 2024 - Adam Pennington
Sources of ATT&CK: A Bibliographic Journey through Enterprise ATT&CK - Robert...
Updates from The Center for Threat Informed Defense - Jon Baker
Go Go Ransom Rangers: Diving into Akira’s Linux Variant with ATT&CK - Nicole ...
ATT&CK From Basic Principles - Tareq AlKhatib
Lifecycle-Aware Power Side-Channel Malware Detection - Alexander Cathis
Ad

Recently uploaded (20)

PDF
A novel scalable deep ensemble learning framework for big data classification...
PDF
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
PDF
Univ-Connecticut-ChatGPT-Presentaion.pdf
PDF
Web App vs Mobile App What Should You Build First.pdf
PPTX
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
PDF
project resource management chapter-09.pdf
PDF
A contest of sentiment analysis: k-nearest neighbor versus neural network
PDF
A comparative study of natural language inference in Swahili using monolingua...
PPT
What is a Computer? Input Devices /output devices
PPTX
TLE Review Electricity (Electricity).pptx
PDF
WOOl fibre morphology and structure.pdf for textiles
PPTX
observCloud-Native Containerability and monitoring.pptx
PDF
Developing a website for English-speaking practice to English as a foreign la...
PDF
gpt5_lecture_notes_comprehensive_20250812015547.pdf
PDF
1 - Historical Antecedents, Social Consideration.pdf
PPTX
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
PPTX
Programs and apps: productivity, graphics, security and other tools
PDF
NewMind AI Weekly Chronicles – August ’25 Week III
PPTX
Group 1 Presentation -Planning and Decision Making .pptx
PDF
From MVP to Full-Scale Product A Startup’s Software Journey.pdf
A novel scalable deep ensemble learning framework for big data classification...
Profit Center Accounting in SAP S/4HANA, S4F28 Col11
Univ-Connecticut-ChatGPT-Presentaion.pdf
Web App vs Mobile App What Should You Build First.pdf
MicrosoftCybserSecurityReferenceArchitecture-April-2025.pptx
project resource management chapter-09.pdf
A contest of sentiment analysis: k-nearest neighbor versus neural network
A comparative study of natural language inference in Swahili using monolingua...
What is a Computer? Input Devices /output devices
TLE Review Electricity (Electricity).pptx
WOOl fibre morphology and structure.pdf for textiles
observCloud-Native Containerability and monitoring.pptx
Developing a website for English-speaking practice to English as a foreign la...
gpt5_lecture_notes_comprehensive_20250812015547.pdf
1 - Historical Antecedents, Social Consideration.pdf
TechTalks-8-2019-Service-Management-ITIL-Refresh-ITIL-4-Framework-Supports-Ou...
Programs and apps: productivity, graphics, security and other tools
NewMind AI Weekly Chronicles – August ’25 Week III
Group 1 Presentation -Planning and Decision Making .pptx
From MVP to Full-Scale Product A Startup’s Software Journey.pdf

Practical Application of MITRE ATT&CK: Real World Usage in a Corporate Environment - Marcelle Lee

  • 1. PRACTICAL APPLICATION OF MITRE ATT&CK: REAL WORLD USAGE IN A CORPORATE ENVIRONMENT Marcelle Lee ATT&CKcon 5.0 22 October 2024
  • 2. ABOUT MARCELLE • Principal InfoSec Engineer & Threat Research Lead @ Equinix • Cyberjutsu Board of Directors • Packet nerd • CTF builder and player • Career changer – a dozen or so years in cyber now • Mom of boys (grown and gone) and a couple of adoptees (grown and not gone), chickens, a dog, a cat, and some fish • @marcellelee on most socials
  • 3. HOW WE USE ATT&CK AT EQUINIX • Research: breaking down TTPs to better understand the threat • Threat hunting and detection engineering: searching for TTPs in our systems • Reporting: sharing with stakeholders • Kill chain analysis: analyze breaches and attacks for lessons learned • Security controls gap analysis: identify where gaps may exist based on identified TTPs • Integration into research tools: mapping activity to the framework
  • 4. RESEARCH • Research is driven by stakeholder priority intelligence requirements (mostly) • Continual cycle of identifying relevant TTPs used by threat actors and assessing corporate exposure • Source is typically OSINT, trusted third- parties, and internal telemetry • We want to know the details for each attack phase where possible
  • 5. THREAT HUNTING AND DETECTION ENGINEERING • TTPs of interest are identified • Map to ATT&CK if not already done • Evaluate existing detection rules for coverage • Deploy additional rules as needed • Write customer rules to cover detection gaps
  • 6. REPORTING • Analyzed TTPs are shared with stakeholders via internal intel reports
  • 7. KILL CHAIN ANALYSIS • TTPs are analyzed and presented in kill chain format
  • 8. SECURITY CONTROLS GAP ANALYSIS • Kill chain analysis is leveraged to assess security control coverage
  • 9. INTEGRATION INTO RESEARCH TOOLS • Any.run example
  • 10. INTEGRATION INTO RESEARCH TOOLS • VirusTotal example