This post was originally published August 14, 2018 on mitre.org
Suppose you’re hunting for threats on your network, and you find a suspicious process using…