Skip to content
[1] Attack Mapping Methodology

[1] Attack Mapping Methodology

By: Prasanna |

1. Cyber Kill Chain

1.1 What is the Cyber Kill Chain

The Cyber Kill Chain is a model developed by Lockheed Martin that describes different stages of a cyber attack end to end. It helps security analysts and to understand and map the standard operating procedures in a sequential way so that they can detect and stop attackers.

It emphasizes that a cyber attack progresses through a chain like sequentially, where the threat actor will have to move to the next part of the chain until the end to achieve their goals.

In simple terms for a cyber defender it’s important to know where exactly in the chain that a threat actor is and take necessary actions to break the chain thereby disrupting the threat actor to achieve their goals.

The below image from Trend Micro’s blog explains the Cyber Kill Chain’s 7 different stages.

#StageDescription
1ReconnaissanceAttackers gather information about the target, such as systems, users, and vulnerabilities.
2WeaponizationThey create a malicious payload by combining exploits with malware.
3DeliveryThe payload is transmitted to the victim via methods like phishing or malicious links.
4ExploitationThe payload is executed by exploiting a vulnerability on the target system.
5InstallationMalware is installed to maintain persistence on the compromised system.
6Command and Control (C2)The attacker establishes a communication channel to remotely control the infected system.
7Actions on ObjectivesThe attacker achieves their goal, such as data exfiltration, lateral movement, or disruption.

1.2 Why it is important ?

The kill chain itself helps in mapping an ongoing cyber attack into a sequential events grouped to stages. This helps build a proactive approach in cyber defense to detect early stages and stop an attack before it inflicts major damage.

In addition, it makes more complex attacks easier to analyze, communicate to different security stakeholders in a easily digestible way. An example would be a clean kill chain mapping into a threat intelligence report or a post incident analysis report.

it also helps build detection rules such as mapping logs or alerts to the kill chain or even a PowerShell execution. Finally, it improves the IR process since it’s quite intuitive to determine at what stage of the attack the Incident response is functioning at.

Here is an example Kill chain Mapping for an attack,

Our investigation revealed the following high-level path the threat actor took to compromise the environment:

1. The threat actor initiated reconnaissance activities by performing system fingerprinting and network enumeration to identify active hosts, services, and potential vulnerabilities within the environment.
   
2. Following reconnaissance, the threat actor moved into the weaponization phase by preparing exploit code tailored to the identified weaknesses and testing various parameters to ensure successful execution.
   
3. The threat actor then delivered the exploit payload through multiple identified vulnerabilities, attempting to gain an initial foothold within the environment.
   
4. Successful exploitation was achieved through multiple techniques, including remote code execution (RCE) via a vulnerable file upload mechanism, as well as the use of known exploits such as EternalBlue and buffer overflow vulnerabilities.
   
5. After gaining access, the threat actor established persistence by installing malicious scripts on compromised systems and configuring a stealthy reverse connection to maintain remote access.
   
6. The threat actor implemented command and control (C2) mechanisms by creating scheduled tasks to maintain persistent communication with compromised hosts and began exfiltrating sensitive data from the environment.
   
7. Finally, the threat actor carried out actions on objectives, including disabling antivirus protections, executing additional malicious scripts, and compromising critical systems such as the domain controller to expand control over the environment.

2. MITRE ATT&CK

2.1 MITRE ATT&CK Framework

In addition to the Cyber kill chain, the MITRE ATT&CK framework dives deep into the tactics, techniques and procedures that can be mapped any ongoing threats. There are 14 different sections that expand into sub techniques.

In addition to MITRE ATT&CK, the D3FEND framework helps by providing a complementary, defense focused taxonomy that maps concrete countermeasures, techniques, and controls to attacker behaviors making it easier for security teams to design, validate, and communicate mitigations (detection rules, system hardening, isolation mechanisms, and response playbooks) that directly correspond to adversary tactics and techniques. 697 Here is an example MITRE ATT&CK Mapping for an attack scenario we’ve mentioned earlier in section 1.2.

PhaseActivityMITRE Technique
ReconnaissanceFingerprinting, Network EnumerationActive Scanning (T1595), Network Service Discovery (T1046)
WeaponizationExploit Development & TestingDevelop Capabilities (T1587)
Initial Access / DeliveryExploit Delivery via VulnerabilitiesExploit Public-Facing Application (T1190)
ExploitationRCE, EternalBlue, Buffer OverflowExploitation for Client Execution (T1203), Exploitation of Remote Services (T1210)
PersistenceMalicious Scripts, Reverse ConnectionPersistence via Scheduled Task/Job (T1053), Remote Access Tools (T1219)
Command & ControlScheduled Jobs, Persistent ConnectionApplication Layer Protocol (T1071), Remote Access Software
ExfiltrationData TheftExfiltration Over C2 Channel (T1041)
Actions on ObjectivesDisable AV, Further Execution, Domain CompromiseImpair Defenses (T1562), Lateral Movement (T1021), Domain Accounts (T1078)

2.2 ICS Cyber Attack - Kill Chain Mapping

According to the SANS Industrial Control Systems Cyber Kill Chain White Paper ICS attacks may have many facets that fall into the attack categories of enabling, initiation or supporting to achive their ultimate effect. The complexity of launching an attack is determined by the security of the system the process being monitored and contrlled, the safety design and controls and the intended impact.

In the Stuxnet campaign there is a completed two-stage ICS attack that le to the highly tailored and impactful manipulation of the process to cause physical destruction. The attack is mapped to the Purdue Model below;