A companion challenge to ATT&CK, this lab focuses on MITRE D3FEND — the defensive counterpart to ATT&CK that provides a structured knowledge base of cybersecurity countermeasures. Where ATT&CK maps adversary techniques, D3FEND maps defensive techniques, artifacts, and digital mappings that defenders can operationalize. This challenge tests navigation of the D3FEND matrix at d3fend.mitre.org.
Each D3FEND technique has a unique ID prefixed with D3-. Looking up D3-SDM in the framework resolves to System Daemon Monitoring — a detection technique that involves monitoring system daemons for anomalous behaviour indicative of compromise or tampering.
D3FEND organises all defensive techniques under five top-level tactics, representing the general categories of defensive action available to defenders. In the order they appear in the framework:
This structure complements ATT&CK’s offensive tactic chain and gives blue teams a direct defensive mapping for each adversary technique.
The open-source project Sentinel2D3FEND bridges the gap between detection and defence — it retrieves Azure Sentinel detection rules that are already mapped to MITRE ATT&CK techniques, then automatically generates the corresponding MITRE D3FEND defensive countermeasures. This allows SOC teams using Sentinel to immediately understand what defensive techniques are relevant to the threats their detection rules cover.
File Access Pattern Analysis is defined by the framework as:
Analyzing the files accessed by a process to identify unauthorized activity.
This technique falls under the Detect tactic and is useful for identifying malware, data staging, or credential access behaviour by correlating process-to-file access patterns against known-good baselines.
A Local Resource Access artifact is defined as:
Ephemeral digital artifact comprising a request of a local resource and any response from that resource.
D3FEND artifacts represent the digital evidence or signals that defensive techniques operate on. Ephemeral artifacts are transient — they exist only in the moment of the request/response and may not persist to disk, making real-time monitoring essential for capturing them.