Red → Blue: translating attacks into defences¶
Actionable workflow¶
Document TTPs (Tactics, Techniques, Procedures)
Example format:
## [T1059.003](https://attack.mitre.org/techniques/T1059/003/) (PowerShell)
- **Exploit Used:** `Invoke-Mimikatz` via trusted LOLBAS (Living-Off-The-Land Binaries)
- **Detection Gap:** No alerts for `amsi.dll` bypass in Sysmon logs
Prioritize by impact¶
Use the DETT&CT framework:
D = Detectability (Can we see it?)
E = Exploitability (How easy is it?)
T = Threat (Is it being used in the wild?)
T = Training (Do analysts understand it?)
& = AND
CT = Criticality (How bad is it if successful?)
Generate defensive artefacts¶
For SIEM: Sigma rule example:
title: AMSI Bypass Attempt
logsource:
product: windows
service: sysmon
detection:
selection:
EventID: 7
Image|endswith: \powershell.exe
LoadedDll|contains: \amsi.dll
filter:
Signature: Microsoft
condition: selection and not filter
For EDR: Custom YARA rule to detect in-memory Mimikatz patterns.
Tools¶
MITRE D3FEND for countermeasure mapping
Last update:
2025-05-12 12:50