Search icon CANCEL
Subscription
0
Cart icon
Your Cart (0 item)
Close icon
You have no products in your basket yet
Save more on your purchases! discount-offer-chevron-icon
Savings automatically calculated. No voucher code required.
Arrow left icon
All Products
Best Sellers
New Releases
Books
Videos
Audiobooks
Learning Hub
Newsletter Hub
Free Learning
Arrow right icon
timer SALE ENDS IN
0 Days
:
00 Hours
:
00 Minutes
:
00 Seconds
Arrow up icon
GO TO TOP
Practical Threat Intelligence and Data-Driven Threat Hunting

You're reading from   Practical Threat Intelligence and Data-Driven Threat Hunting A hands-on guide to threat hunting with the ATT&CK™ Framework and open source tools

Arrow left icon
Product type Paperback
Published in Feb 2021
Publisher Packt
ISBN-13 9781838556372
Length 398 pages
Edition 1st Edition
Arrow right icon
Author (1):
Arrow left icon
Valentina Costa-Gazcón Valentina Costa-Gazcón
Author Profile Icon Valentina Costa-Gazcón
Valentina Costa-Gazcón
Arrow right icon
View More author details
Toc

Processing and Exploitation

After collection, the data must be processed and exploited to be converted into intelligence. The IOCs must be provided with context and its relevance and reliability must be assessed.

A way to approach to it is to break data into buckets and take advantage of available frameworks to look for patterns.

We are going to quickly review three of the most use intelligence frameworks: The Cyber Kill Chain, the Diamond Model and the ATT&CK Framework. The latter will have a full chapter dedicated to it later on.

The Cyber Kill Chain®

Developed by Lockheed Martin, the Cyber Kill Chain® is a means to identify the steps the threat actor should follow in order to achieve their objective.

It differentiates seven different steps:

  1. Reconaissance: process of getting to know the victim using noninvasive techniques.
  2. Weaponization: generating the exploit that is going to be delivered.
  3. Delivery: delivering the weaponized artifact.
  4. Exploitation: achieving code execution on the victim´s system through the exploitation of a vulnerability.
  5. Installation: installing the final malware piece.
  6. Command and Control (C2): establishing a channel to communicate with the malware on the victim´s system.
  7. Actions on objectives: with full access and communication, the attacker achieves his goal.This model has been criticized for not being good enough to describe the way some modern attacks work, but at the same time has been praise for delimiting the points in which an attack can be stopped.
Figure 1.6: Lockheed Martin Cyber Kill Chain®

The Diamond Model

The Diamond Model provides a simple way to track breach intrusions, since it helps to establish the atomic elements involved in them. It is composed of four main features: adversary, infrastructure, capability and victim. These are for features are connected by the sociopolitical and the technical axes.

Figure 1.7: The Diamond Model

We will now have a look at the MITRE ATT&CK Framework.

MITRE ATT&CK Framework

The MITRE ATT&CK™ Framework is a descriptive model used to label and study the activities that a threat actor is capable of carrying out in order to get foothold and operate inside an enterprise environment, a cloud environment, smartphones or even inside industrial control systems.

The magic behind the ATT&CK™ framework is that it provides a common taxonomy for the cyber security community to describe the adversary behavior. It works as a common language that both offensive and defensive researchers can use to better understand each other and to better communicate with people not specialized in the field.

And on top of that you not only can use it as you see fit, but you can also build on top of it, creating your own set of tactics, techniques an procedures (TTPs).

There are 12 tactics used to encompass different set of techniques. Each tactic represents a tactical goal, i.e., the reason why the threat actor is showing a specific behavior. Each of these tactics is composed by a set of techniques and subtechniques that describes specific threat actor behaviors The procedure is the specific way in which a threat actor implements a specific technique or subtechnique. One procedure can expand into multiple techniques and subtechniques too.

Figure 1.8: The Enterprise Matrix

We will now have a look at bias and analysis.

lock icon The rest of the chapter is locked
Register for a free Packt account to unlock a world of extra content!
A free Packt account unlocks extra newsletters, articles, discounted offers, and much more. Start advancing your knowledge today.
Unlock this book and the full library FREE for 7 days
Get unlimited access to 7000+ expert-authored eBooks and videos courses covering every tech area you can think of
Renews at £13.99/month. Cancel anytime
Visually different images