Overview
Chronos-DFIR provides deep MITRE ATT&CK framework integration to automatically map forensic evidence to adversary Tactics, Techniques, and Procedures (TTPs). Every Sigma detection rule and YARA signature includes MITRE technique tags, enabling analysts to visualize the attack kill chain and prioritize investigation based on threat actor behavior.MITRE ATT&CK is a globally accessible knowledge base of adversary tactics and techniques based on real-world observations. Chronos-DFIR uses ATT&CK v14 (2024) with 14 tactics and 200+ techniques.
Framework Coverage
Chronos-DFIR detection rules cover all 12 enterprise tactics + Impact (TA0040):TA0001 - Initial Access
TA0001 - Initial Access
Goal: How adversaries gain initial footholdTechniques Covered:
- T1078 - Valid Accounts (compromised credentials)
- T1190 - Exploit Public-Facing Application
- T1566 - Phishing (spearphishing attachments/links)
- T1133 - External Remote Services (VPN, RDP brute force)
- Anomalous logon patterns (service account interactive logons)
- Off-hours authentication from unusual IPs
- Exploit artifact traces in IIS/Apache logs
TA0002 - Execution
TA0002 - Execution
Goal: Running malicious code on victim systemTechniques Covered:
- T1059.001 - PowerShell (encoded commands)
- T1059.003 - Windows Command Shell
- T1059.004 - Unix Shell (bash, sh)
- T1047 - WMI Execution
- T1204 - User Execution (malicious documents)
powershell.exe -EncodedCommandwith hidden window style- WMI process creation via
wmic process call create - Suspicious script execution from temp directories
TA0003 - Persistence
TA0003 - Persistence
Goal: Maintaining access across rebootsTechniques Covered:
- T1547.001 - Registry Run Keys
- T1053.005 - Scheduled Task/Job
- T1543.003 - Windows Service Creation
- T1574.001 - DLL Search Order Hijacking
- T1176 - Browser Extensions
- T1037 - Boot/Logon Initialization Scripts
- New scheduled tasks with suspicious paths
- Service creation from non-standard directories
- LaunchAgent/LaunchDaemon persistence (macOS)
TA0004 - Privilege Escalation
TA0004 - Privilege Escalation
Goal: Gaining higher-level permissionsTechniques Covered:
- T1548.002 - Bypass User Account Control (UAC)
- T1068 - Exploitation for Privilege Escalation
- T1134 - Access Token Manipulation
- T1078 - Valid Accounts (privilege escalation)
- UAC bypass via CMSTP, FodHelper, EventVwr hijacking
- Token impersonation events (Event ID 4672)
- Exploitation of unpatched CVEs
TA0005 - Defense Evasion
TA0005 - Defense Evasion
Goal: Avoiding detection by security toolsTechniques Covered:
- T1070.001 - Clear Windows Event Logs
- T1070.003 - Clear Command History
- T1562.001 - Disable/Modify Tools (AV, EDR, Firewall)
- T1027 - Obfuscated Files or Information
- T1218 - System Binary Proxy Execution (rundll32, regsvr32)
- T1112 - Modify Registry
wevtutil cl Security(log clearing)- Windows Defender disabled via registry modification
- LOLBin abuse:
rundll32.exeloading suspicious DLLs
TA0006 - Credential Access
TA0006 - Credential Access
Goal: Stealing credentials and secretsTechniques Covered:
- T1003.001 - LSASS Memory Dumping (Mimikatz)
- T1003.002 - Security Account Manager (SAM) extraction
- T1552.001 - Credentials in Files
- T1555 - Credentials from Password Stores
- T1110 - Brute Force
- Process access to
lsass.exewithPROCESS_VM_READ - SAM/SYSTEM registry hive export
- Browser credential database access (Login Data, logins.json)
TA0007 - Discovery
TA0007 - Discovery
Goal: Learning about victim environmentTechniques Covered:
- T1087 - Account Discovery
- T1083 - File and Directory Discovery
- T1057 - Process Discovery
- T1049 - System Network Connections Discovery
- T1018 - Remote System Discovery
net user /domain(domain account enumeration)dir C:\Users\*\Documents(document reconnaissance)tasklist,ps aux,netstat -ano(environment mapping)
TA0008 - Lateral Movement
TA0008 - Lateral Movement
Goal: Moving through victim networkTechniques Covered:
- T1021.001 - Remote Desktop Protocol (RDP)
- T1021.002 - SMB/Windows Admin Shares
- T1047 - Windows Management Instrumentation
- T1076 - Remote Desktop Protocol (legacy)
- Network logon Type 3 from admin accounts
- PsExec execution artifacts (Event ID 7045)
- RDP logon Type 10 to multiple systems rapidly
TA0009 - Collection
TA0009 - Collection
Goal: Gathering data of interestTechniques Covered:
- T1560 - Archive Collected Data (7zip, WinRAR, tar)
- T1074 - Data Staged (local/remote staging)
- T1113 - Screen Capture
- T1005 - Data from Local System
- 7z.exe compressing sensitive directories
- Large files staged in
C:\ProgramData\orC:\Temp\ - Screenshot tools (snipping tool, malicious screen capture)
TA0010 - Exfiltration
TA0010 - Exfiltration
Goal: Stealing data from victim networkTechniques Covered:
- T1048 - Exfiltration Over Alternative Protocol (DNS, ICMP)
- T1567.002 - Exfiltration to Cloud Storage (Mega, Dropbox, S3)
- T1041 - Exfiltration Over C2 Channel
- T1537 - Transfer Data to Cloud Account (rclone)
- Rclone syncing to external cloud storage
- Unusual DNS query volumes (DNS tunneling)
- Large outbound transfers to non-corporate IPs
TA0011 - Command and Control
TA0011 - Command and Control
Goal: Communicating with compromised systemsTechniques Covered:
- T1071.001 - Web Protocols (HTTP/HTTPS C2)
- T1071.004 - DNS (DNS tunneling)
- T1573 - Encrypted Channel
- T1090 - Proxy (SOCKS, web proxies)
- Cobalt Strike beacon traffic patterns
- DNS queries to
.oniondomains (Tor C2) - Suspicious SSL certificates (self-signed, invalid CN)
TA0040 - Impact
TA0040 - Impact
Goal: Disrupting business operationsTechniques Covered:
- T1486 - Data Encrypted for Impact (ransomware)
- T1490 - Inhibit System Recovery (shadow copy deletion)
- T1489 - Service Stop (disabling backups)
- T1491 - Defacement
vssadmin delete shadows /all /quiet- Ransomware encryption patterns (file extension changes)
- Service termination (SQL, Exchange, backup agents)
TTP Extraction and Display
How TTPs Are Extracted
Chronos-DFIR parses MITRE technique IDs from Sigma rule tags:Dashboard TTP Summary Strip
The TTP Summary Strip displays active techniques at the top of the dashboard:Forensic Context Modal - MITRE Kill Chain
The Forensic Context modal includes a dedicated MITRE kill chain section:Kill Chain Visualization
Chronos-DFIR organizes detected techniques into a linear kill chain that mirrors the adversary’s progression through the MITRE framework:Kill Chain Logic: Tactics are ordered chronologically to show attack progression. Not all incidents will trigger every tactic—ransomware may skip lateral movement and jump directly from Execution → Impact.
TTP Analysis in README Context
The README.md from the source repository provides insight into how TTP analysis is performed:Forensic Report TTP Extraction
FromREADME.md (lines 232-250):
TTP Summary Strip
- Nuevo elemento
#ttp-summary-stripdebajo del dashboard con badges de severity (CRITICAL: N, HIGH: N) + pills de MITRE techniques (T1003, T1059, etc.)- Se actualiza dinámicamente con cada refresh del dashboard (filtros, time range)
- Proporciona feedback visual inmediato de que los TTPs cambiaron al filtrar
MITRE Integration Architecture
Export Formats with TTP Data
Context Export (JSON)
When exporting forensic context, TTP data is included:HTML Report
The HTML export includes a color-coded kill chain section:MITRE ATT&CK Tactic Reference
| Code | Tactic | Description | Common Techniques |
|---|---|---|---|
| TA0001 | Initial Access | Entry point into network | T1078, T1190, T1566 |
| TA0002 | Execution | Running malicious code | T1059, T1047, T1204 |
| TA0003 | Persistence | Maintaining access | T1547, T1053, T1543 |
| TA0004 | Privilege Escalation | Gaining higher permissions | T1548, T1068, T1134 |
| TA0005 | Defense Evasion | Avoiding detection | T1070, T1562, T1027 |
| TA0006 | Credential Access | Stealing credentials | T1003, T1552, T1555 |
| TA0007 | Discovery | Learning environment | T1087, T1083, T1057 |
| TA0008 | Lateral Movement | Moving through network | T1021, T1047, T1076 |
| TA0009 | Collection | Gathering target data | T1560, T1074, T1113 |
| TA0010 | Exfiltration | Stealing data | T1048, T1567, T1041 |
| TA0011 | Command & Control | Communicating with victim | T1071, T1573, T1090 |
| TA0040 | Impact | Disrupting operations | T1486, T1490, T1489 |
Real-World Example: Ransomware Attack
Here’s how Chronos-DFIR maps a typical ransomware incident:Detection Timeline
-
TA0001 - Initial Access: Phishing email with malicious attachment
- Sigma Rule:
T1566_Phishing.yml(Office document with macros)
- Sigma Rule:
-
TA0002 - Execution: PowerShell downloads second-stage payload
- Sigma Rule:
T1059_001_powershell_encoded.yml(42 encoded commands)
- Sigma Rule:
-
TA0005 - Defense Evasion: Disables Windows Defender
- Sigma Rule:
T1562_impair_defenses.yml(registry modification)
- Sigma Rule:
-
TA0007 - Discovery: Enumerates domain accounts and shares
- Sigma Rule:
T1087_account_discovery.yml(net user /domain)
- Sigma Rule:
-
TA0008 - Lateral Movement: Spreads to file servers via SMB
- Sigma Rule:
T1021_002_smb_admin_shares.yml(admin$ access)
- Sigma Rule:
-
TA0006 - Credential Access: Dumps LSASS memory
- Sigma Rule:
T1003_credential_dumping.yml(Mimikatz detected)
- Sigma Rule:
-
TA0009 - Collection: Stages 15GB of data in C:\ProgramData\
- Sigma Rule:
T1074_data_staged.yml(large file staging)
- Sigma Rule:
-
TA0010 - Exfiltration: Uploads to Mega.nz via rclone
- YARA Rule:
QILIN_Ransomware_Rclone_Exfiltration(rclone strings)
- YARA Rule:
-
TA0040 - Impact: Deletes shadow copies, encrypts files
- Sigma Rule:
T1490_inhibit_system_recovery.yml(vssadmin delete) - YARA Rule:
QILIN_Ransomware_Strings_Windows(ransom note)
- Sigma Rule:
Chronos-DFIR Output
Dashboard Badge:CRITICAL: 3 HIGH: 9
TTP Strip: T1566 T1059 T1562 T1003 T1486 T1490
Risk Level: Critical (95/100)
Forensic Context Export:
Threat Actor Profiling
Chronos-DFIR uses TTP patterns to infer threat actor sophistication:| TTP Pattern | Actor Profile | Example Groups |
|---|---|---|
| Tactic count: 3-5 | Script kiddie, opportunistic malware | Commodity ransomware, cryptominers |
| Tactic count: 6-8 | Organized cybercrime, ransomware operators | LockBit, BlackCat, ALPHV |
| Tactic count: 9+ | APT, nation-state, advanced ransomware | APT29, APT41, Conti, QILIN |
| TA0006 + TA0010 | Credential theft + exfiltration = double extortion | Modern ransomware groups (post-2020) |
| TA0008 only | Worm-like propagation | WannaCry, NotPetya |
Related Detection Systems
Sigma Rules
86+ detection rules with MITRE technique tags
YARA Rules
Binary pattern matching with MITRE attribution
External Resources
Continuous Coverage Expansion
Chronos-DFIR’s MITRE coverage grows with each detection rule added: Current Coverage (v185):- 86 Sigma rules covering 51 techniques across 12 tactics
- 7 YARA rule sets with technique attribution
- v2.0: Expand to 150+ rules, add Mobile ATT&CK (Android/iOS)
- v3.0: ICS/OT ATT&CK for industrial control systems
- v4.0: Automated ATT&CK Navigator heatmap generation