From cybersecurity-skills
Analyzes intrusions against Lockheed Martin Cyber Kill Chain to map adversary phases, defense gaps, and preventive controls for post-incident analysis and security planning.
npx claudepluginhub mukul975/anthropic-cybersecurity-skills --plugin cybersecurity-skillsThis skill uses the workspace's default tool permissions.
Use this skill when:
Applies Acme Corporation brand guidelines including colors, fonts, layouts, and messaging to generated PowerPoint, Excel, and PDF documents.
Builds DCF models with sensitivity analysis, Monte Carlo simulations, and scenario planning for investment valuation and risk assessment.
Calculates profitability (ROE, margins), liquidity (current ratio), leverage, efficiency, and valuation (P/E, EV/EBITDA) ratios from financial statements in CSV, JSON, text, or Excel for investment analysis.
Use this skill when:
Do not use this skill as a standalone framework — combine with MITRE ATT&CK for technique-level granularity beyond what the 7-phase kill chain provides.
The Lockheed Martin Cyber Kill Chain consists of seven phases. Map all observed adversary actions:
Phase 1 - Reconnaissance: Adversary gathers target information before attack.
Phase 2 - Weaponization: Adversary creates attack tool (malware + exploit).
Phase 3 - Delivery: Adversary transmits weapon to target.
Phase 4 - Exploitation: Adversary exploits vulnerability to execute code.
Phase 5 - Installation: Adversary establishes persistence on target.
Phase 6 - Command & Control (C2): Adversary communicates with compromised system.
Phase 7 - Actions on Objectives: Adversary achieves goals.
Create a phase matrix for the incident:
Phase 1: Recon → Completed (undetected)
Phase 2: Weaponize → Completed (undetected — pre-attack)
Phase 3: Delivery → Completed; phishing email bypassed SEG
Phase 4: Exploit → Completed; CVE-2023-23397 exploited
Phase 5: Install → DETECTED: EDR flagged scheduled task creation (attack stalled here)
Phase 6: C2 → Not achieved (installation blocked)
Phase 7: Objectives → Not achieved
For each phase completed without detection, document the defensive control gap.
Each kill chain phase maps to multiple ATT&CK tactics:
Within each phase, enumerate specific ATT&CK techniques observed and map to existing detections.
For each phase, document applicable defensive courses of action (COAs):
Structure findings as:
| Term | Definition |
|---|---|
| Kill Chain | Sequential model of adversary intrusion phases; breaking any link theoretically stops the attack |
| Courses of Action (COA) | Defensive responses mapped to each kill chain phase: detect, deny, disrupt, degrade, deceive, destroy |
| Beaconing | Regular, periodic C2 check-in pattern from compromised host to adversary server; detectable by frequency analysis |
| Phase Completion | Adversary successfully finishes a kill chain phase and progresses to the next; defense-in-depth aims to prevent this |
| Intelligence Gain/Loss | Analysis of whether detecting at Phase 5 (vs. Phase 3) reduced intelligence about adversary capabilities or intent |