Name The Threat Profile
SOC, CTI, or Both
How Did They Do It
What Are the Signs
ATT&CK-tic in Action
100

Financially motivated, deploys ransomware, operates leak site

What is a Ransomware Group?

100

Validating a phishing alert and containing endpoint

What is SOC?

100

Malware encrypts files and demands payment (name the attack)

What is ransomware?

100

Multiple failed logins followed by success from same IP

What is potential brute-force attempt?

100

User clicks malicious link and downloads payload

What is Initial Access? 

200

Long-term persistence, espionage-focused, often tied to a nation-state

What is an Advanced Persistent Threat (APT)?

200

Tracking infrastructure patterns across multiple campaigns

What is CTI?

200

Executes malicious code within a legitimate process (name the technique)

What is process injection?

200

Login from two geographically distant locations within minutes 

What is impossible travel?


DAILY DOUBLE: 

User confirms they are traveling abroad - do you: close, monitor, or escalate? 

200

Encoded PowerShell spawns from Word

What is Execution?

300

low-skill attackers who use prebuilt tools and exploits written by others

What is a script kiddie?

300

Turning a malicious domain report into a detection rule

What is SOC with CTI support?

300

Uses PowerShell, WMI, or built-in tools to evade detection (name the TTP) 

What is Living-off-the-Land?

300

User reports MFA push notifications they did not initiate

What is MFA Fatigue?

300

Process accesses LSASS memory

What is Credential Access?

400

conducts attacks motivated by political or ideological beliefs, often defacing websites or launching DDoS campaigns

What is a hacktivist?

400

Producing an assessment on emerging ransomware trends

What is CTI?

400

 attacker logs in using legitimate employee credentials with no brute force activity or failed login attempts

What is use of valid accounts

400

New admin account created outside approved change window

What is privilege escalation concern?

400

remote service created to pivot to another host

What is lateral movement

500

a trusted employee or contractor exfiltrates sensitive data using authorized credentials

What is an insider threat  

500

Hunting for behavior tied to newly reported TTPs.

What is SOC informed by CTI?

500

small, encrypted outbound connections at consistent timed intervals to a newly registered domain (name the technique)

What is command-and-control (C2) beaconing?

500

user successfully authenticates to multiple systems without any interactive logon events or password entry recorded

    What is Pass-The-Hash

500

Data compressed and sent to external cloud storage before ransomware deployed

What is Exfiltration?

M
e
n
u