A financial organization has experienced a sophisticated cyberattack. The security team wants to analyze the adversary's tactics, techniques, and procedures systematically to understand the threat better. Which framework should they utilize to map the adversary behavior and identify common methods used in this attack?
Cyber Kill Chain
MITRE ATT&CK
OWASP Testing Guide
Diamond Model of Intrusion Analysis