I find cyber threat intelligence fascinating and I wanted to find a way to use it to enhance our security operations. Previous efforts to use threat feeds had been frustrating as there were a lot of false positives and very little context. Last year at DerbyCon I learned about the MITRE ATT&CK framework and I’ve been searching for ways to leverage it in our environment. MITRE ATT&CK is a knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base can be utilized as a foundation for the development of specific threat models and methodologies to detect and defend against cyber adversaries.
Tactics are what attackers are trying to achieve (such as maintaining persistence and undetected presence in your environment). A technique is a specific behavior to achieve a goal and is often a single step in a string of activities employed to complete the attacker’s overall mission. The ATT&CK website provides many details about each technique including a description, examples, references, and suggestions for mitigation and detection.
I created a heat map based on the following groups which have been known to target defense, manufacturing and aviation industries:
Scores were assigned to each technique and the score would increase if it was used by more than one adversary. I was advised by other threat analysts that a single color with a gradient would be more effective than utilizing a multicolor scheme like a traffic light protocol.
My initial thought was that this color-coded heat map would make a good visual and it could be used to better communicate our defense priorities. In this particular iteration, we found that process monitoring and file monitoring were two of our top priorities to defend against this set of adversaries.
Now that I had this representation I went through each technique and made a list of the log sources that could be analyzed to see instances of the technique in our enterprise. My team worked together to determine if we had gaps in our visibility of these techniques. Our goal was not to block any of these techniques because a number of them are legitimate processes that can be used maliciously. Our primary focus was on tactics that were to the left of persistence so that potentially malicious behavior could be targeted pre-persistence.
With this foundation, we used MISP to search for tags that matched APT groups and techniques based on what we saw in the heat map. These feeds could then be enriched by Cortex analyzers and fed into our SIEM to enrich our correlations with more context.
Previously we had fed entire threat feeds directly into our SIEM; by using this more targeted approach we were able to greatly reduce the number of false positives.
These ideas are early in their implementation. I will continue to build out this process with my team and update as metrics and efficiencies can be documented. In our current environment, I believe that we can become better defenders by working together and sharing information. If you have questions feel free to contact me.
The original article was published on Linkedin.com at
https://www.linkedin.com/pulse/how-use-mitre-attck-heat-maps-enrich-your-security-keith-chapman