Skip to main content

Worked Examples: Frameworks

Purpose

Show how to use ATT&CK, Diamond Model, Cyber Kill Chain, and Pyramid of Pain without turning them into decoration.

Correct ATT&CK Mapping

FieldExample
BehaviorShortcut file launches PowerShell to download a second-stage payload.
TechniqueT1059.001 - Command and Scripting Interpreter: PowerShell
EvidenceReported in source summary; command-line pattern not fully published.
Mapping confidenceMedium
Mapping qualityM2 if only behavior is described; M3 if tied to a specific query and telemetry.
Detection idea.lnk execution spawning powershell.exe with external network connection.
Rejected alternativesT1204 alone is insufficient because the relevant detectable behavior is script execution after user interaction.

Incorrect ATT&CK Mapping

Bad MappingWhy It Fails
"Actor is MuddyWater, therefore map all known MuddyWater techniques."Actor profile coverage is not incident evidence.
"PowerShell appeared in a report, therefore production coverage exists."Mapping is not detection validation.
"Two actors share T1059.001, therefore they are related."Common techniques are weak attribution evidence.

Diamond Model Event

Diamond VertexFilled Example
AdversaryUnknown; source reports a named cluster, but local evidence does not prove identity.
CapabilityScript execution and payload retrieval.
InfrastructureExternal URL and hosting provider observed in proxy logs.
VictimFinance workstation in a business unit with access to invoice workflows.
Timestamp2026-05-15T10:42:00Z
ResultCandidate intrusion event requiring triage.
ConfidenceMedium for event existence, low for actor identity.

Kill Chain Use Without Forced Chronology

Useful:

Delivery and execution are observed. Reconnaissance and weaponization are Unknown. Do not infer missing stages.

Not useful:

Every intrusion must be documented through all seven stages before response can begin.