APT / Nation-State Intrusion Response Quickstart

Time-boxed response path for a suspected advanced persistent threat. APT incidents reward patience and thoroughness over speed: the fastest short-term containment is often the cause of failed long-term eradication. This path emphasizes TTP characterization, dwell-time hunting, and assume-breach recovery.

Kit
Overall Progress0 of 10 (0%)
Track Progress

First 15 Minutes

0/3
0 of 3 (0%)
01

Validate the APT Hypothesis

Critical
~5 min

Confirm the observations that triggered the APT classification: custom or non-public tooling, targeted rather than opportunistic behavior, long-dwell indicators, anti-forensics, or a nation-state advisory match. APT classification carries operational and legal implications; avoid the label unless evidence supports it, but do not under-classify if evidence is present.

02

Activate Closed Incident Bridge

Critical
~5 min

Convene a closed-bridge with SOC lead, TI lead, legal counsel, and CISO. Restrict incident-channel access on a need-to-know basis; assume the adversary may be monitoring internal Slack/Teams/email. Agree on a private attribution posture for the investigation phase; avoid public attribution statements without explicit approval.

03

Preserve Volatile Evidence Before Disturbance

Critical
~5 min

APT tooling often resides in memory or relies on network connections that disappear on containment action. Before any containment step, capture memory from suspected-compromised hosts and snapshot active network connections. Lost volatile evidence is hard to recreate; rushed containment that destroys it makes the investigation harder.

First 60 Minutes

0/3
0 of 3 (0%)
04

Build Initial TTP Profile

Critical
~30 min

Enumerate confirmed techniques so far against MITRE ATT&CK tactics (Initial Access, Execution, Persistence, Privilege Escalation, Credential Access, Discovery, Lateral Movement, Collection, C2, Exfiltration). Identify 3-5 candidate threat groups whose tracked tradecraft matches observed TTPs; do not rush to a single attribution. For each candidate, build a hunt list of additional tooling and persistence you should look for.

05

Pivot Through Attacker Infrastructure

~20 min

From each confirmed IoC, pivot through passive DNS, WHOIS, TLS certificate registries (Censys, Shodan), and threat-intel feeds to discover attacker infrastructure clusters. Record every pivot and the confidence level behind each additional IoC. Engage threat-intel team for ISAC and vendor-private IoC sharing under NDA.

06

Decide LEA Coordination Posture

~10 min

If attribution points to a nation-state or nation-state-adjacent actor, decide whether to engage law-enforcement or a national CSIRT (CISA, NCSC, CERT-FR, BSI) now. This is a legal/strategic decision -- get legal counsel and the CISO aligned. If LEA engagement is chosen, establish a single point of contact and start a document trail for every LEA-relevant observation.

First 4 Hours

0/4
0 of 4 (0%)
07

Extend Investigation Window to Retention Limit

Critical
~60 min

APT actors commonly dwell for months before detection. Extend the investigation window to the full retention of each log source; document gaps where retention is shorter than suspected dwell. If key retention is short (EDR 30 days, DNS 7 days), initiate log-recovery from backup or SIEM cold storage immediately.

08

Hunt LOLBin Abuse and Low-Prevalence Persistence

Critical
~90 min

Hunt for living-off-the-land patterns (anomalous parent-child chains, rare command-line patterns, LSASS access from unexpected processes) and low-prevalence persistence (WMI event subscriptions, scheduled task XML with hidden flags, service DLLs in unusual paths, COM hijacking, AppInit_DLLs, IFEO debugger hijacks). APT persistence is usually unique per host or campaign; generic signatures miss it.

09

Hunt Cloud Identity Persistence

Critical
~60 min

Hunt for long-dwell OAuth app grants, mailbox rules that forward to external addresses, audit-suppression toggles, unexplained administrative-role assignments, and service-principal changes in Entra ID. Cloud identity persistence is frequently the APT foothold that survives an endpoint-only cleanup.

10

Plan the Assume-Breach Reset

~30 min

Begin planning the domain-wide reset: double krbtgt rotation (not single), service-account rotation, domain-admin and Entra ID global-admin reset, organization-wide refresh-token revocation, and rebuild of any compromised-tier systems. Sequence carefully with application owners; rushed identity reset is a common cause of business disruption that prolongs the incident.