TTP-Based Hunting

July 2020
Topics: Cybersecurity, Computer Security, Network Security, Threat-informed Defense, Cyber Threat Intelligence
Roman Daszczyszak II, The MITRE Corporation
Daniel R. Ellis, The MITRE Corporation
Steve Luke, The MITRE Corporation
Sean M. Whitley, The MITRE Corporation
Download PDF (1.51 MB)

A growing body of evidence from industry, MITRE, and government experimentation confirms that collecting and filtering data based on knowledge of adversary tactics, techniques, and procedures (TTPs) is an effective method for detecting malicious activity. This approach is effective because the technology on which adversaries operate (e.g., Microsoft Windows) constrains the number and types of techniques they can use to accomplish their goals post-compromise.

There are a relatively small number of these techniques, and they occur on systems owned by the victim organization. All adversaries must either employ these known techniques or expend vast resources to develop novel techniques regardless of their capabilities or strategic mission objectives.

This paper expands on existing best practices to detect malicious behaviors expressed as techniques, using a method that is operating system technology agnostic, and describes the step-by-step procedures to implement.


Publication Search