Skip to main content

Worked Examples: CTI to Detection

Purpose

Show the full path from CTI claim to SOC handoff without claiming production coverage too early.

Full Chain

StageFilled Example
CTI claimReported: threat reporting describes archive delivery followed by script execution and external payload retrieval.
Evidence labelReported; source is reliable but does not include raw local telemetry.
ObservableArchive extraction followed by powershell.exe, wscript.exe, or cscript.exe execution.
TelemetryEmail gateway, EDR process creation, file creation, network connections.
Hunt hypothesisIf archive-based delivery is present, then endpoints that receive suspicious archives may spawn script interpreters within 24 hours.
Detection backlog itemDET-CAND-001 Archive extraction followed by script interpreter and external connection.
DRL scoreDRL-3 initially; DRL-5 after synthetic positive/negative tests and field mapping.
False positivesIT deployment packages, installers, helpdesk scripts, internal automation.
SOC handoffCheck user, host role, email source, change ticket, process tree, network destination, and downloaded payload disposition.

Detection Readiness Boundary

Hunt-ready:
Source-backed behavior, telemetry fields identified, initial query written.

Pilot-ready:
Positive and negative tests pass, benign baseline reviewed, SOC triage drafted.

Production coverage:
Only DRL-9 after historical replay, measured false-positive rate, owner, rollback plan, review date, and SOC approval.