Kill Chain phases
1: Reconnaissance and Precursors
2: Weaponization
3: Delivery
4: Exploitation
5: Installation
6: Command and Control (C2)
7: Actions on Objectives
What is the Kill Chain
KC - 1: Recon / Precursors
KC - 2: Weaponization
- Packaging (Container, Exploit, First-stage binary)
KC - 3: Delivery
KC - 4: Exploitation
Disposition / Execution of exploit
KC - 5: Installation
- Droppers
KC - 6: Command and Control (C2)
Associated with establishing communications
KC - 7: Actions on Objectives
Four vertices of the Diamond Model
Adversary
Capability / TTP
Victim
Infrastructure
DM - Adversary
Any data related to perpetrators such as:
Individual or group behind an event. Two types:
DM - Capability / TTP
Tools employed, techniques demonstrated:
DM - Infrastructure
Any vehicle for delivering capabilities
DM - Victim
The vicitm is the recipient of the capabilities, deployed across infrastructure by the adversary. It can be:
CoA
Course of Action. It helps answer:
The CoA is the complement (of the KC) of actions for network defenders.
The 7 D’s of Action Matrix
Discover Detect Deny Disrupt Degrade Deceive Destroy
CoA: Discover
Log searching
Post-hoc signature use
Heuristic searching
CoA: Detect
Identification of known-bad activity Future complement of discover Triggers race condition to end of the kill chain Robust instrumentation is key enabler Pairs with other CoAs
Detection refers to identifying intrusion activity that may occur in the future and is one of the most basic actions one can take.
CoA: Deny
Prevent occurrence outright
CoA: Disrupt
Interfere so as to cause failure
CoA: Degrade
Interfere to reduce efficacy. Slows down potentially malicious actions.
CoA: Deceive
Provide misinformation to adversary or code.
CoA: Destroy
Offensive action that reduces capacity to operate. Not legal for most entities. Examples:
MITRE ATT&CK
Documentation of tactics and techniques (for intrusions)
Tactics
Techniques
Sub-techniques
Procedures