Operationalizing the MITRE ATT&CK framework for Security Operations, Threat Hunting and DFIR
By Rukhsar Khan on Friday, December 7, 2018
Cyber attackers are constantly becoming more and more subtle while Security Operations (SOC, CERT and CSIRT) continues to scratch on the surface. It doesn’t matter whether that’s a large enterprise, bank or government institution. The evidence is fairly strong that most organizations are pretty bad at security operations1 . Why are there so many global high-profile breaches? Why can organizations today not adequately detect and respond to breaches while they have spent millions in their Cyber Security defense? You don’t have to be a genius to figure out that there must be vital gaps in the defense ecosystem of organizations. But how to identify these gaps and what course of actions are required?
The MITRE ATT&CK framework is one of the long awaited answers to these kind of questions. From a long time the Cyber Security industry was lacking a holistic approach to detection and mitigation of advanced targeted attacks. In order to develop such a holistic approach and make it available to the public, MITRE, a US-based nonprofit organization, spent many years in analyzing the global high profile breaches and categorizing them into individual Tactics, Techniques and Procedures (TTPs). As a result to this work, three matrices have been evolved, namely the Pre-ATT&CK Matrix, the ATT&CK Matrix for Mobile and the ATT&CK Matrix for Enterprise.
The Pre-ATT&CK Matrix covers the pre-exploit phases of a breach whereas the ATT&CK Matrix for Enterprise is a post-compromise matrix. And as the name implies, the ATT&CK Matrix for Mobile is dedicated to mobile devices. At its core, the ATT&CK Matrix is expressed in the Structured Threat Information Expression (STIX) language in order to allow organizations to integrate it with their Cyber Security defense ecosystem.
This blog series starts with an overview of current major problems that we have identified in Security Operations and Digital Forensics and Incident Response (DFIR) teams and the reasons behind these. We will then move forward with a solution draft that encompasses the MITRE ATT&CK framework along with a robust Cyber Threat Intelligence (CTI) and appropriate data collection sources for data enrichment including all Cyber Security threat information expressed in the STIX language. Although the solution draft includes specific commercial and non-commercial products and tools from various vendors and organizations, we are not necessarily in favour of any specific one. However, the core implementation of the MITRE ATT&CK framework in our solution draft is performed in the IBM Resilient Security Orchestration, Automation and Response (SOAR) product.
CTI-Stix-Diamond-Activity-Attack-Graph Open Source tool for visualizing STIX 2.1 content
in an Attack Graph and Activity Thread Graph by applying The Diamond Model of Intrusion Analysis methodology as well as Tactics (Phases), Techniques and Procedures (TTP) from the MITRE ATT&CK v8.2 framework
More precisely the Attack Graph aims to provide a graphical representation of a known attack scenario sourced by some adversary (Threat Actor) whereas the Activity Thread Graph represents the local findings... Read more
Sign up for FREE online training sessions Intelligence-driven Threat Hunting for improving SOC maturity level
October 2020 - June 2021
with SOAR, MITRE ATT&CK, SANS 6-step IR, The Diamond Model of Intrusion Analysis, Cyber Threat Intelligence, MaGMa Use Case Framework and more
In order to increase their maturity level, SOC organizations frequently introduce intelligence-driven Threat Hunting. Benefits of intel-driven Threat Hunting are... Read more
Rukhsar's recent GCFA Gold paper
Read Rukhsar's recent GCFA Gold paper with the title Threat Hunting and Incident Response in a post-compromised environment