Lab 1treat
Lab 1treat
Analysis
Objective:
This lab focuses on understanding and profiling threat actors using the MITRE ATT&CK Framework.
Students will analyze the tactics, techniques, and procedures (TTPs) used by real-world threat actors,
and learn how to profile them effectively.
Lab Outline:
Analyzing the motivations, goals, and resources of different threat actor groups (e.g.,
APTs, cybercriminals, hacktivists).
Use tools like OSINT and threat intelligence reports to gather information about the
group’s tactics.
Map the attack lifecycle from initial access to exfiltration based on the MITRE ATT&CK
framework.
4. Creating a Threat Actor Profile
Collect and synthesize data on the threat actor's behavior and techniques.
▪ Indicators of Compromise (IoCs) associated with the group (e.g., IP addresses, file
hashes).
Discuss the attack chain and how the threat actor moves through it.
5. Applying MITRE ATT&CK for Threat Intelligence
Understanding how to use the MITRE ATT&CK framework to improve defense posture.
Lab Tasks:
▪ Threat reports and blogs from security vendors (e.g., CrowdStrike, FireEye).
2. Analyze TTPs:
Research and list Tactics, Techniques, and Sub-techniques used by the selected group.
Create an attack chain diagram for the adversary group, identifying how they would
execute a complete attack from initial access to data exfiltration.
Identify the tactics, techniques, and sub-techniques used at each phase of the attack.
3. Reporting:
Provide insights into how the attack could have been detected using the MITRE ATT&CK
framework.
Include:
2. Report Evaluation:
The report should summarize the adversary’s behavior and suggest possible detection
methods for each tactic and technique observed.
Expected Outcomes:
• Students will gain an understanding of how to profile threat actors and map their behavior to
• They will become proficient in identifying adversary tactics, techniques, and indicators of
• Students will learn how to integrate the MITRE ATT&CK Matrix into threat hunting efforts
Deliverables:
2. Real-World Attack Analysis: A report analyzing a real-world attack and mapping it to MITRE
ATT&CK.
3. Reflection: Briefly discuss the importance of threat actor profiling and how the MITRE ATT&CK
• This lab is critical for building a foundational understanding of how adversaries operate, which
will make it easier for students to understand the YARA rule creation process in the next lab.
• The lab also sets the stage for understanding the attack lifecycle, which is essential for
Conclusion:
This lab will provide students with practical experience in understanding how threat actors operate,
which will allow them to apply more effective detection and mitigation strategies. By the end of this
exercise, students will be equipped to use MITRE ATT&CK to profile adversaries and identify their
tactics, techniques, and procedures (TTPs), setting the foundation for the subsequent application
of YARA rules for advanced threat hunting.