Discovering and containing malicious behaviors
A powerful feature of ATT&CK is making Cyber Threat Intelligence (CTI) information actionable to discover and contain malicious actions during incident response.
We are going to use as an example Kaspersky's report on Hakuna MATA, an investigation into a malicious campaign by threat actor Lazarus, published at https://securelist.com/lazarus-on-the-hunt-for-big-game/97757/, about the installation of the VHD ransomware and the chain of compromise, as shown in the following diagram:
According to this report, the initial attack vector may have a compromised vulnerable VPN gateway; this allowed attackers to access the network, make lateral movements, elevate privileges, and compromise different services such as Active Directory.
Now, let's assume that your SOC team detects a connection from your network to one of the C2 described...