🔏
RootGuard
HomeSOC OperationsIncident ResponseWindows ForensicsLinux ForensicsKQL Investigations
  • Welcome
    • RootGuard
      • Who Am I?
        • Professional Profile
  • Resources Hub
    • Blogs
      • Articles
        • Safeguarding SMEs: The Strategic Importance of a Security Operations Center (SOC)
      • Posts
        • Roadmap to Becoming a Cybersecurity Specialist
        • Starting a Career in Cybersecurity
        • A Guide to Landing Your First Cybersecurity Analyst Role
        • Moving from Intermediate to Expert Incident Responder
  • SOC Operations
    • Introduction
      • Development Resources
        • SOC Analysts Roadmap
        • Becoming A SOC Analyst
        • SOC Analysts Prep Interview Questions
    • Essential Skills
      • Critical Windows EventIDs to Monitor
    • Junior Analyst Skills
      • Splunk Use Cases
      • KQL Use Cases
        • Reconnaissance (TA0043)
        • Initial Access (TA0001)
        • Execution (TA0002)
        • Persistence (TA0003)
        • Privilege Escalation (TA0004)
        • Defence Evasion (TA0005)
        • Credential Access (TA0006)
        • Discovery (TA0007)
        • Lateral Movement (TA0008)
        • Collection (TA0009)
        • Command and Control (TA0011)
        • Exfiltration (TA0010)
        • Impact (TA0040)
      • Investigating Common Attacks
        • Domain Dominance Attacks - Detection & Analysis
        • Investigating a Suspected AD FS Distributed Key Management (DKM) Attack
        • Authentication From Suspicious DeviceName
        • Identifying Interactive or RemoteInteractive Session From Service Account
        • Identifying Split or Part Archive File Transfers
        • Detect Potential Cleartext Credentials in Command Line
        • Detecting Command Line Interpreters Launched via Scheduled Tasks
        • Detecting Files Containing Potentially Sensitive Data
        • Detecting DeviceNetworkEvents From Windows Processes and Domains by TLD
        • Detecting Silent cmd.exe Execution With Redirected STDERR & STDOUT
        • Detecting Low Prevalence DLL Loaded From Process In User Downloads Directory
        • Detecting Virtual Drive Mounted From Archive
        • Identify Execution of Script From User's Downloads Folder
        • Identify Potential RDP Tunneled Sessions
        • Identify Instances of PowerShell Invoke-WebRequest, IWR or Net.WebClient
        • Identify Processes Launched by PowerShell Remoting (WSMProvHost.exe)
        • Detect DeviceNetworkEvents for LOLBAS with Download or Upload Functions
        • Detect Execution of PSEXESVC via Remote Systems
        • Identify Suspicious String in Service Creation ImagePath
        • Identify File with Double Extensions
        • Detect Potential Cleartext Credentials in Commandline
        • Detect When Large Number of Files Downloaded From OneDrive or SharePoint
        • Identify and Investigate Phishing Attacks with KQL
      • PowerShell for SecOps
        • Powershell Remoting
        • Reconnaissance Discovery
        • Initial Access Discovery
        • Execution Discovery
        • Persistence Discovery
        • Privilege Escalation Discovery
        • Defence Evasion Discovery
        • Credential Access Discovery
        • Discovery
        • Lateral Movement Discovery
        • Collection Discovery
        • Command & Control (C2) Discovery
        • Exfiltration Discovery
        • Impact Discovery
      • Packet Analysis (pcap)
        • Tcpdump
        • Tcpdump (Intermediate)
        • Tshark
        • Ngrep
      • Investigating Suspicious Emails Using KQL
    • Intermediate and Advanced Skills
      • Investigate Using MITRE ATT&CK Methodology
        • Reconnaissance (TA0043) Techniques
        • Resource Development (TA0042) Techniques
        • Initial Access (TA0001) Techniques
        • Command Execution (TA0002) Techniques
        • Persistence (TA0003) Techniques
        • Privilege Escalation (TA0004) Techniques
        • Defence Evasion (TA0005) Techniques
        • Credential Access (TA0006) Techniques
        • Discovery (TA0007) Techniques
        • Lateral Movement (TA0008) Techniques
        • Collection (TA0009) Techniques
        • Command and Control (C2) (TA0011) Techniques
        • Exfiltration (TA0010) Techniques
        • Impact (TA0040) Techniques
    • Vulnerability Management
    • Malware Analysis
  • DFIR
    • Incident Response
      • Incident Triage
        • Triage Types and Processes
        • PowerShell for Detection and Analysis
          • Malware or Compromise Investigation
          • Lateral Movement Discovery
        • Registry Analysis
        • Sysinternals Intrusion Analysis
        • PowerShell Intrusion Analysis
        • Velociraptor Intrusion Analysis
        • Zimmerman Tools Intrusion Analysis
      • KAPE Artifacts Analysis
      • Velociraptor Artifacts Analysis
      • Using The Unified Kill Chain Model to Analyse Individual Cyber Attacks
        • Phase 1 - Gaining an Initial Foothold
          • Gaining Access to the Network
          • Establishing a Foothold
          • Network Discovery
      • Response Strategies
        • Privilege Escalation Assessment
        • Command and Control Assessment
        • Command Execution Assessment
        • Defence Evasion Assessment
        • Detection Assessment
        • Discovery Assessment
        • Exfiltration Assessment
        • Initial Access Assessment
        • Initial Impact Assessment Techniques
        • Lateral Movement Assessment
        • Persistence Assessment
    • Windows Forensics
      • Evidence of Execution
      • Window Artifact Analysis
        • Account Usage
        • User Activity Tracking (Event Logs)
        • Program Execution
        • File and Folder Opening
        • File Download
        • Browser Usage
        • Deleted File or File Knowledge
        • External Device & USB Usage
    • Linux Forensics
      • Linux Commandline Basics
      • Host Compromise Assessment
    • KQL for Defender & Sentinel
      • MDO (Office)
      • MDI (Identity)
      • MDE (Endpoint)
    • Memory Forensics
      • Memory Forensics (Volatility 3)
    • Playbooks
      • First Responder DFIR Playbook
        • Device Isolation
        • Evidence Collection
          • Acquire Triage Image Using KAPE
          • Acquire Triage Data Using Velociraptor
          • Acquire Triage Data Using Powershell
          • Acquire Triage Memory Image
          • Acquire Image Using FTK
          • AXIOM Cyber Data Collection
        • Windows Forensic Artefacts
          • Application Execution
          • File & Folder Knowledge
          • External Device Usage
          • Network Activity
          • Windows Event Logs
        • Initial Analysis
          • Memory Analysis (Vol 3)
          • Axiom Cyber Examiner
  • Detection Engineering
    • AD Attack Detections & Mitigations
      • Kerberoasting
      • Authentication Server Response (AS-REP) Roasting
      • Password Spraying
      • MachineAccountQuota Compromise
      • Unconstrained Delegation
      • Password in Group Policy Preferences (GPP) Compromise
      • Active Directory Certificate Services (AD CS) Compromise
      • Golden Certificate
      • DCSync
      • Dumping ntds.dit
      • Golden Ticket
      • Silver Ticket
      • Golden Security Assertion Markup Language (SAML)
      • Microsoft Entra Connect Compromise
      • One-way Domain Trust Bypass
      • Security Identifier (SID) History Compromise
      • Skeleton Key
      • Active Directory Security Controls
      • Active Directory Events for Detecting Compromise
    • Attack Triage Playbooks (KQL Triage)
      • Windows Malware Detection Playbook
      • Linux Host Intrusion Detection Playbook (CLI)
      • Linux Intrusion Detection Playbook
      • Large-Scale Compromise Detection Playbook
      • Ransomware Detection Playbook
      • Phishing Email Compromise Detection Playbook
      • Scam Detection Playbook
      • Customer Phishing Detection Playbook
      • Insider Abuse Detection Playbook
      • Information Leakage Detection Playbook
      • Social Engineering Detection Playbook
      • Malicious Network Behaviour Detection Playbook
      • Windows Intrusion Detection Playbook
      • Vulnerability Detection Playbook
      • Business Email Compromise Detection Playbook
    • Process Execution (KQL Triage)
    • Threat Hunting
      • Hunting Ransomware Indicators
      • Hunting With KQL
        • Detecting Malware Infection (MITRE ATT&CK: T1566, T1059)
        • Discovery Activities (MITRE ATT&CK: T1016, T1083, T1046)
        • Credential Theft (MITRE ATT&CK: T1003, T1078)
        • Lateral Movement (MITRE ATT&CK: T1076, T1021)
        • Data Theft (MITRE ATT&CK: T1041, T1071)
        • Detecting CommandLine Executions (MITRE ATT&CK: T1059)
        • Windows Security Logs (Identity and Logon Activities)
      • Hunting With Splunk
Powered by GitBook
On this page
  • The Unified Kill Chain
  • Key Characteristics of the Unified Kill Chain
  • The Phases of the Unified Kill Chain - Attack Phases (Tactics)
  • Attack Phase Combinations
  • 1. Initial Foothold
  • 2. Network Propagation
  • 3. Actions on Objectives
  • Benefits of the Unified Kill Chain
  • Summary of the Unified Kill Chain Phases
Edit on GitHub
  1. DFIR
  2. Incident Response

Using The Unified Kill Chain Model to Analyse Individual Cyber Attacks

PreviousVelociraptor Artifacts AnalysisNextPhase 1 - Gaining an Initial Foothold

Last updated 4 months ago

The Unified Kill Chain

is a combination of the and tactics. It is intended to be an updated version of the Cyber Kill Chain to better fit modern attacks.

The Unified Kill Chain (UKC) is an evolution of traditional attack kill chain models. It combines concepts from Lockheed Martin's Cyber Kill Chain and MITRE’s ATT&CK framework to create a comprehensive, detailed representation of the entire attack lifecycle. The UKC bridges gaps in traditional models by including both the attacker’s tactics and techniques and a defender’s perspective for detecting, mitigating, and responding to threats across all stages of an attack.

UKC defines the attack lifecycle through three overarching phases, further broken into 18 distinct steps. These phases encapsulate the attacker’s journey from initial access to achieving their objectives, providing a comprehensive understanding of modern cyberattacks.

Key Characteristics of the Unified Kill Chain

The UKC is organised into three overarching categories that encompass the complete lifecycle of a cyberattack:

  1. Network Propagation: Once inside, attackers aim to expand their reach within the network. This includes lateral movement, privilege escalation, credential harvesting, and reconnaissance to locate high-value targets.

  2. Actions on Objectives: In this phase, attackers execute their end goal, such as exfiltrating sensitive data, deploying ransomware, or disrupting services.

By combining and mapping steps from the Cyber Kill Chain (focused on the progression of an attack) and MITRE’s ATT&CK framework (focused on specific techniques and tactics used by attackers), the UKC offers a granular, actionable roadmap for understanding attacks and implementing defences.

The Phases of the Unified Kill Chain - Attack Phases (Tactics)

The Unified Kill Chain 18 phases or tactics are the steps a cyberattack may progress through. Any particular attack can skip phases, repeat phases, or go out of order.

  1. Reconnaissance: identify and select targets

  2. Weaponization: set up infrastructure for attack

  3. Delivery: Send weaponised object (e.g., malware) to target

  4. Social Engineering: manipulate people to perform unsafe actions

  5. Exploitation: take advantage of a vulnerability on target’s systems (possibly to execute code)

  6. Persistence: maintain access to systems

  7. Defense Evasion: avoiding detection and defences

  8. Command and Control: communicate with compromised systems to control them

  9. Pivoting: use a controlled system to gain access to others

  10. Discovery: gain knowledge about system and network

  11. Privilege Escalation: gain higher-level permissions

  12. Execution: run attacker-controlled code

  13. Credential Access: steal usernames and passwords

  14. Lateral Movement: access and control other systems

  15. Collection: gather data of interest

  16. Exfiltration: steal data from the network

  17. Impact: manipulate, interrupt, or destroy systems or data

  18. Objectives: use social and technical means to achieve strategic goal

Attack Phase Combinations

This phase covers the attacker’s efforts to infiltrate the target network or system and establish an initial presence. It mirrors the early stages of traditional attack models like reconnaissance and exploitation. The attacker seeks to avoid detection while planting the seeds for further exploitation.

  1. Reconnaissance: Gathering information about the target, such as network structure, technologies in use, or employee data, to identify vulnerabilities.

  2. Weaponisation: Developing or acquiring tools, such as malware or exploit kits, to target identified vulnerabilities.

  3. Delivery: Transmitting the weaponised payload to the target, often via phishing emails, malicious links, or USB drives.

  4. Exploitation: Exploiting a vulnerability in the target system to gain unauthorised access.

  5. Installation: Installing malware or a backdoor to maintain access to the compromised system.

2. Network Propagation

After gaining a foothold, attackers focus on expanding their control within the target environment. This phase includes lateral movement, privilege escalation, and reconnaissance within the network to achieve broader access and visibility.

  1. Command and Control (C2): Establishing a communication channel between the compromised system and the attacker’s infrastructure for remote control.

  2. Internal Reconnaissance: Mapping the network, discovering connected systems, and identifying valuable assets or credentials for further exploitation.

  3. Credential Dumping: Extracting credentials from the compromised system for use in lateral movement or privilege escalation.

  4. Privilege Escalation: Elevating access privileges to administrative or system levels.

  5. Lateral Movement: Moving across the network to access additional systems or resources using stolen credentials or exploits.

  6. Persistence: Establishing mechanisms to maintain access over time, such as creating new accounts, modifying registry keys, or deploying backdoors.

3. Actions on Objectives

In this final phase, attackers achieve their ultimate objectives, such as stealing data, deploying ransomware, or causing system disruption. This phase represents the culmination of their activities within the target environment.

  1. Data Collection: Gathering sensitive information, intellectual property, or financial records from compromised systems.

  2. Data Exfiltration: Transferring stolen data to external locations controlled by the attacker.

  3. Impact: Causing harm to the organisation, which may include encrypting files (ransomware), destroying systems, or disrupting operations.

  4. Defence Evasion: Taking steps to avoid detection or remediation by clearing logs, disabling security tools, or masking activity.

  5. Anti-Forensics: Modifying or destroying forensic evidence to hinder investigation and analysis.

  6. Execution: Running final malicious commands, scripts, or payloads to achieve their goals.

  7. Action Completion: Wrapping up the attack by either covering tracks or preparing the system for future exploitation.

Benefits of the Unified Kill Chain

The UKC provides defenders with a more flexible and realistic approach to cyber threats compared to earlier models. It emphasises the need for visibility across every phase of the attack lifecycle and supports mapping detection strategies and response actions to attacker behaviours. Additionally, it helps SOC teams and cybersecurity professionals prioritise their efforts by focusing on breaking the chain of events that attackers rely on to achieve their objectives.

By leveraging the UKC, organisations can better align their detection, prevention, and response efforts with real-world attack patterns, improving their resilience against sophisticated threats. It serves as a foundational tool for designing robust defence-in-depth strategies that incorporate endpoint protection, network monitoring, and advanced threat-hunting capabilities.

Summary of the Unified Kill Chain Phases

The Initial Foothold phase focuses on getting access to the target. The Network Propagation phase emphasises gaining more profound control and access across the environment. Finally, the Actions on Objectives phase centres on achieving the attacker's ultimate goals, ranging from data theft to operational disruption. By breaking down these phases into 18 steps, the UKC provides a granular, actionable roadmap for defenders to identify, mitigate, and disrupt attacks at every stage. It enables a proactive defence by offering insights into attackers' tactics, techniques, and procedures (TTPs).

: These steps focus on how attackers gain access to a system or network. Techniques include social engineering, phishing, exploiting vulnerabilities, or supply chain attacks.

Initial Foothold
1. Initial Foothold
Jump In
The Unified Kill Chain
Cyber Kill Chain
MITRE ATT&CK
The Unified Kill Chain Model