MITRE

TryHackMe Jamie Ngo todayMay 29, 2021 2503

Background
share close

Walkthrough of the MITRE room.


Task 1: Introduction to MITRE


Task 2: Basic Terminology


Task 3: ATT&CK Framework

What is the ATT&CK® framework? According to the website, “MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.” In 2013, MITRE began to address the need to record and document common TTPs (Tactics, Techniques, and Procedures) that APT (Advanced Persistent Threat) groups used against enterprise Windows networks. This started with an internal project known as FMX (Fort Meade Experiment). Within this project, selected security professionals were tasked to emulated adversarial TTPs against a network, and data was collected from the attacks on this network. The gathered data helped construct the beginning pieces of what we know today as the ATT&CK® framework.

The ATT&CK® framework has grown and expanded throughout the years. One notable expansion was that the framework focused solely on the Windows platform but has expanded to cover other platforms, such as macOS and Linux. The framework is heavily contributed to by many sources, such as security researchers and threat intelligence reports. Note this is not only a tool for blue teamers. The tool is also useful for a penetration tester and/or red teamer.

If you haven’t done so, navigate to the ATT&CK® website.

Direct your attention to the bottom of the page to view the ATT&CK® Matrix for Enterprise. Across the top of the matrix, there are 14 categories. Each category contains the techniques an adversary could use to perform the tactic. The categories cover the seven-stage Cyber Attack Lifecycle (credit Lockheed Martin for the Cyber Kill Chain).

Under Initial Access, there are 9 techniques. Some of the techniques have sub-techniques, such as Phishing. 

If we click on the gray bar to the right, a new layer appears listing the sub-techniques. 

To get a better understanding of this technique and it’s associated sub-techniques, click on Phishing.

We have been directed to a page dedicated to the technique known as Phishing and all related information regarding the technique, such as a brief description, Procedure Examples, and Mitigations

You can alternatively resort to using the Search feature to retrieve all associated information regarding a given technique, sub-technique, and/or group. 

Lastly, the same data can be viewed via the MITRE ATT&CK® Navigator: “The ATT&CK® Navigator is designed to provide basic navigation and annotation of ATT&CK® matrices, something that people are already doing today in tools like Excel. We’ve designed it to be simple and generic – you can use the Navigator to visualize your defensive coverage, your red/blue team planning, the frequency of detected techniques, or anything else you want to do.”

You can access the Navigator view when visiting a group or tool page. The ATT&CK® Navigator Layers button will be available.

In the sub-menu select view.

Let’s get acquainted with this tool. Click here to view the ATT&CK® Navigator for Carbanak. 

At the top left, there are 3 sets of controls: selection controlslayer controls, and technique controls. I encourage you to inspect each of the options under each control to get familiar with them. The question mark at the far right will provide additional information regarding the navigator. 

To summarize, we can use the ATT&CK Matrix to map a threat group to their tactics and techniques.  There are various methods the search can be initiated. The questions below will help you become more familiar with the ATT&CK®. It is recommended to start answering the questions from the Phishing page.


Only blue teamers will use the ATT&CK Matrix? (Yay/Nay)

What is the ID for this technique?

Answer: Nay

Based on this technique, what mitigation covers identifying social engineering techniques?

Answer: User Training

There are other possible areas for detection for this technique, which occurs after what other technique?

Answer: Training

What group has used spear phishing in their campaigns?

Answer: Dragonfly

Based on the information for this group, what are their associated groups?

Answer: TG-4192, Crouching Yeti, IRON LIBERTY, Energetic Bear

What tool is attributed to this group to transfer tools or files from one host to another within a compromised environment?

Answer: PsExec

Based on the information about this tool, what group used a customized version of it?

Answer: FIN5

This group has been active since what year?

Answer: 2008

Instead of Mimikatz, what OS Credential Dumping tool is does this group use?

Answer: Windows Credential Editior


Task 4: CAR Knowledge Base

The official definition of CAR is “The MITRE Cyber Analytics Repository (CAR) is a knowledge base of analytics developed by MITRE based on the MITRE ATT&CK® adversary model. CAR defines a data model that is leveraged in its pseudocode representations but also includes implementations directly targeted at specific tools (e.g., Splunk, EQL) in its analytics. With respect to coverage, CAR is focused on providing a set of validated and well-explained analytics, in particular with regards to their operating theory and rationale.

Instead of further attempting to explain what CAR is, let’s dive in. With our newly acquired knowledge from the previous section, we should feel comfortable and understand the information that CAR is providing to us.

Let’s begin our journey by reviewing CAR-2020-09-001: Scheduled Task – File Access.

Upon visiting the page, we’re given a brief description of the analytic and references to ATT&CK (techniquesub-technique, and tactic).

We’re also provided with Pseudocode and a query on how to search for this specific analytic within Splunk. A pseudocode is a plain, human-readable way to describe a set of instructions or algorithms that a program or system will perform.

Note the reference to Sysmon. We have not covered Sysmon as of yet, but you can read more about this tool here.

To take full advantage of CAR, we can view the Full Analytic List or the CAR ATT&CK® Navigator layer to view all the analytics.

Full Analytic List

In the Full Analytic List view, we can see what implementations are available for any given analytic at a single glance, along with what OS platform it applies to.

CAR ATTACK Navigator

(The techniques highlighted in blue are the analytics currently in CAR)

Let’s look at another analytic to see a different implementation, CAR-2014-11-004: Remote PowerShell Sessions.

Under Implementations, pseudocode is provided and an EQL version of the pseudocode. EQL (pronounced as ‘equal’), and it’s an acronym for Event Query Language. EQL can be utilized to query, parse, and organize Sysmon event data. You can read more about this here

To summarize, CAR is a great place for finding analytics that takes us further than the Mitigation and Detection summaries in the ATT&CK® framework. This tool is not a replacement for ATT&CK® but an added resource.


For the above analytic, what is the pseudocode a representation of?

Answer: Splunk Search

What tactic has an ID of TA0003?

Answer: Persistence

What is the name of the library that is a collection of Zeek (BRO) scripts?

Answer: BZAR

What is the name of the technique for running executables with the same hash and different names?

Answer: Masquerading

Examine CAR-2013-05-004, what additional information is provided to analysts to ensure coverage for this technique?

Answer: Unit Tests


Task 5: Shield Active Defence

Per the website, “Shield is an active defense knowledge base MITRE is developing to capture and organize what we are learning about active defense and adversary engagement. Derived from over 10 years of adversary engagement experience, it spans the range from high level, CISO ready considerations of opportunities and objectives, to practitioner friendly discussions of the TTPs available to defenders.

The U.S. Department of Defense defines active defense as “The employment of limited offensive action and counterattacks to deny a contested area or position to the enemy.

Shield Active Defense is similar to the ATT&CK® Matrix, but the tactics and techniques provided to us enable us to trap and/or engage (with) an adversary active within the network. For example, we can plant decoy credentials on a resource and monitor if/when the account’s credentials are used elsewhere within the network. By doing this, we are alerted to the adversary’s presence and provides the opportunity to learn about their tools and tactics. The information that is gathered can be classified as threat intelligence
If you haven’t done so, navigate to the Shield website. Across the Shield (Active Defense Matrix) top are the tactics, similar to the ATT&CK® Matrix. 

Each column will list the techniques associated with each tactic (again, as the ATT&CK® Matrix). By clicking on any column headers, we will be redirected to a page providing more information.

Let’s click on Collect. At this point, we should already be familiar with how MITRE displays the information to us. Here we see a brief definition of tactic, Collect, and associated ID along with the list of techniques, each with a brief description.

Click on DTE0012 – Decoy Credentials.

Aside from the summary, we are provided with OpportunitiesUse Cases, and Procedures to perform this technique. Also, note that this technique maps to other Shield tactics (yes, I will repeat it – this is also the case with the ATT&CK® Matrix). Finally, at the bottom is listed the ATT&CK® Techniques associated with this Shield Technique.

Exploring the navigation options across the top links are provided to us to view the Shield Tactics and Techniques as individual pages. This view is good if you want a summary of each at a glance. 

Under ATT&CK® Mapping Overview (in our case) for Initial Access [TA0001], the table lists the ATT&CK® Techniques and hints (opportunities) on how to use the suggestive Active Defense Technique in our environment. 

That should be enough of an overview. Now to practice using this tool by answering the questions below. 


Which Shield tactic has the most techniques?

Answer: Detect

Is the technique ‘Decoy Credentials’ listed under the tactic from question #1? (Yay/Nay)

Answer: Yay

Explore DTE0011, what is the ID for the use case where a defender can plant artifacts on a system to make it look like a virtual machine to the adversary?

Answer: DUC0234

Based on the above use case, what is its ATT&CK® Technique mapping?

Answer: T1497

Continuing from the previous question, look at the information for this ATT&CK® Technique, what 2 programs are listed that adversary’s will check for?

Answer: Correct Answer


Task 6: ATT&CK Enumeration Plans

If these tools provided to us by MITRE are not enough, under MITRE ENGENUITY, we have CTID, the Adversary Emulation Library, andATT&CK® Emulation Plans.

CITD

MITRE formed an organization named The Center of Threat-Informed Defense (CTID). This organization consists of various companies and vendors from around the globe. Their objective is to conduct research on cyber threats and their TTPs and share this research to improve cyber defense for all. 

Some of the companies and vendors who are participants of CTID:

  • AttackIQ
  • Verizon
  • Microsoft
  • Red Canary
  • Splunk

Per the website, “Our goal is to change the game on adversaries by relentlessly improving our collective ability to prevent, detect, and respond to cyber attacks.

Adversary Emulation Library & ATT&CK® Emulations Plans

The Adversary Emulation Library is a public library making adversary emulation plans a free resource for blue/red teamers. The library and the emulations are a contribution from CTID. There are 3 ATT&CK® Emulation Plans currently available: APT3APT29, and FIN6. The next ATT&CK® Emulation in the pipeline is FIN7. The emulation plans are a step-by-step guide on how to mimic the specific threat group. If any of the C-Suite were to ask, “how would we fare if APT29 hits us?” This can easily be answered by referring to the results of the execution of the emulation plan. 

Review the emulation plans to answer the questions below. 


How many phases does APT3 Emulation Plan consists of?

Answer: 3

Under Persistence, what binary was replaced with cmd.exe?

Answer: sethc.exe

Examining APT29, what 2 tools were used to execute the first scenario?

Answer: Pupy and Metasploit

What tool was used to execute the second scenario?

Answer: PoshC2

Where can you find step-by-step instructions to execute both scenarios?

Answer: ATT&CK Arsenal


Task 7: ATT&CK and Threat Intelligence

Threat Intelligence (TI) or Cyber Threat Intelligence (CTI) is the information, or TTPs, attributed to the adversary. By using threat intelligence, as defenders, we can make better decisions regarding the defensive strategy. Large corporations might have an in-house team whose primary objective is to gather threat intelligence for other teams within the organization, aside from using threat intel already readily available. Some of this threat intel can be open source or through a subscription with a vendor, such as CrowdStrike. In contrast, many defenders wear multiple hats (roles) within some organizations, and they need to take time from their other tasks to focus on threat intelligence. To cater to the latter, we’ll work on a scenario of using ATT&CK® for threat intelligence. The goal of threat intelligence is to make the information actionable. 

Scenario: You are a security analyst who works in the aviation sector. Your organization is moving their infrastructure to the cloud. Your goal is to use the ATT&CK® Matrix to gather threat intelligence on APT groups who might target this particular sector and use techniques targeting your areas of concern. You are checking to see if there are any gaps in coverage. After selecting a group, look over the selected group’s information and their tactics, techniques, etc. 


What is a group that targets your sector who has been in operation since at least 2013?

Answer: APT33

Does this group use Stuxnet? (Yay/Nay)

Answer: Nay

As your organization is migrating to the cloud, is there anything attributed to this APT group that you should focus on? If so, what is it?

Answer: Cloud Accounts

What tool is associated with this technique?

Answer: Ruler

Per the detection tip, what should you be detecting?

Answer: Abnormal or malicious behavior

What platforms does this affect?

Answer: Azure AD, Google Workspace, IaaS, Office 365, SaaS


Task 8: Conclusion

Written by: Jamie Ngo

Tagged as: .

Rate it

Previous post

Similar posts

Post comments (0)