Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... ·...

33
| 1 | Copyright © 2016 Splunk Inc. Detec%ng The Adversary Postcompromise With Threat Models And Behavioral Analy%cs Michael Kemmerer MITRE

Transcript of Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... ·...

Page 1: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

| 1 | Copyright © 2016 Splunk Inc.

Detec%ng  The  Adversary  Post-­‐compromise  With  Threat  Models  And  Behavioral  Analy%cs  

Michael Kemmerer MITRE

Page 2: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Por$ons  of  this  technical  data  were  produced  for  the    U.S.  Government  under  Contract  No.  W15P7T-­‐13-­‐C-­‐A802,    

and  are  subject  to  the  Rights  in  Technical  Data-­‐Noncommercial    Items  clause  at  DFARS  252.227-­‐7013  (FEB2012)  

©2015  The  MITRE  Corpora$on.  All  rights  reserved  

2  

Page 3: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Two  Projects,  One  Goal  

Adversarial  Tac%cs,  Techniques  and  Common  Knowledge  (ATT&CK™)  

The  Fort  Meade  eXperiment  (FMX)  

146  days  -­‐  The  median  $me  an  adversary  is  in  a  network  before  being  detected  

-­‐Mandiant,    M-­‐Trends  2016  

3  

Page 4: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Cyber  ANack  Lifecycle  

Recon  

Weaponize  

Deliver  

Exploit  

Control  

Execute  

Maintain  

Tradi$onal  CND  

ATT&CK  /  FMX  

4  

Page 5: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Threat  Based  Modeling  

•  Cyber  threat  analysis  

•  Research  •  Industry  reports  

Adversary  Behavior  

•  Adversary  model  •  Post-­‐compromise  techniques  

ATT&CK  •  Data  sources  •  Analy%cs  •  Priori%za%on  

FMX  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

5  

Page 6: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

ATT&CK:  Deconstruc%ng  the  Lifecycle  •   Persistence  •   Privilege  Escala$on  •   Creden$al  Access  •   Host  Enumera$on  •   Defense  Evasion  •   Lateral  Movement  •   Execu$on  •   Command  and  Control  •   Exfiltra$on

Threat  data  informed  adversary  model    

Higher  fidelity  on  right-­‐of-­‐exploit,  post-­‐access  phases    

Describes  behavior  sans  adversary  tools  

Addi%onal  Tac%cs  Coming  Soon  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

6  

Page 7: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

The  ATT&CK  Model  •  Consists  of:    1.  Tac%c  phases  derived  from  Cyber  ANack  Lifecycle  2.  List  of  techniques  available  to  adversaries  for  each  phase  3.  Possible  methods  of  detec%on  and  mi%ga%on  4.  Documented  adversary  use  of  techniques  

•  Publically  available  adversary  informa$on  is  a  problem  –  Not  granular  enough  –  Insufficient  volume  

Image  source:  www.mrpotatohead.net  

Mr.  Potato  Head  is  a  registered  trademark  of  Hasbro  Inc.  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

7  

Page 8: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Example  of  Technique  Details    

Persistence  –  New  Windows  Service  •  Descrip$on:  When  Windows  starts,  it  also  starts  programs  called  services.  A  

service's  configura%on  informa%on,  including  the  service's  executable,  is  stored  in  the  registry.  Adversaries  may  install  a  new  service  which  will  be  executed  at  startup  by  directly  modifying  the  registry  or  by  using  tools.  

•  Placorm:  Windows  •  Permissions  required:  Administrator,  SYSTEM  •  Effec$ve  permissions:  SYSTEM  •  Use:  Part  of  ini%al  infec%on  vector  or  used  during  opera%on  to  locally  or  remotely  

execute  persistent  malware.  May  be  used  for  privilege  escala%on.  •  Detec$on:  Monitor  new  service  crea%on.  Look  for  out  of  the  ordinary  service  names  

and  ac%vity  that  does  not  correlate  with  known-­‐good  soiware,  patches,  etc.  New  services  may  show  up  as  outlier  processes  that  have  not  been  seen  before  when  compared  against  historical  data.  

•  Data  Sources:  Windows  Registry,  process  monitoring  

Informa%on  on  Threat  Actors  and  Tools  Coming  Soon  ©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

8  

Page 9: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

ATT&CK  Matrix™  Tac%cs  and  Techniques  Persistence   Privilege  

Escala$on  Creden$al  Access  

Host  Enumera$on  

Defense  Evasion  

Lateral  Movement   Execu$on   C2   Exfiltra$on  

Accessibility  Features  AddMonitor  

BIOS  

DLL  Search  Order  Hijack  Edit  Default  File  Handlers  

Hypervisor  Rootkit  

Legi$mate  Creden$als  

Logon  Scripts  

Master  Boot  Record  

Mod.  Exist’g  Service  

New  Service  Path  Intercep$on  

Registry  Run  Keys  

Scheduled  Task  

Service  File  Permission  Weakness  

Serv.  Reg.  Perm.  Weakness  

Shortcut  Modifica$on  

Windows  Mgmt  Instr.  Event  Subsc.  

Winlogon  Helper  DLL  

Bypass  UAC  DLL  Injec$on  

Exploita$on  of  Vulnerability  

Creden$al  Dumping  

DLL  Side-­‐Loading  Disabling  

Security  Tools  

File  System  Logical  Offsets  

Indicator  blocking  on  

host  Indicator  

removal  from  tools  

Indicator  removal  from  

host  Masquerad-­‐ing  

NTFS  Extended  Aiributes  Obfuscated  Payload  

Process  Hollowing  Rootkit  

Rundll32  Scrip$ng  Sojware  Packing  

Account  enumera$on  

Creden$als  in  Files  

Network  Sniffing  User  

Interac$on  

Binary  Padding  File  system  enumera$on  

Group  permission  enumera$on  

Local  network  connec$on  enumera$on  

Opera$ng  system  

enumera$on  

Owner/User  enumera$on  

Process  enumera$on  

Security  sojware  

enumera$on  

Service  enumera$on  Window  

enumera$on  

Applica$on  deployment  sojware  

Exploita$on  of  Vulnerability  

Logon  scripts  

Pass  the  hash  

Pass  the  $cket  Peer  

connec$ons  Remote  Desktop  Protocol  

Remote  Services  

Replica$on  through  

removable  media  Shared  webroot  

Taint  shared  content  

Windows  management  instrumenta$on  

Windows  remote  management  

Command  Line  

File  Access  PowerShell  Process  

Hollowing  Registry  Rundll32  

Scheduled  Task  

Service  Manipula$on  Third  Party  Sojware  

Commonly  used  port  

Comm  through  removable  media  

Custom  applica$on  

layer  protocol  

Custom  encryp$on  cipher  Data  

obfusca$on  Fallback  channels  Mul$band  comm  

Mul$layer  encryp$on  

Peer  connec$ons  Standard  app  layer  protocol  

Standard  encryp$on  cipher  

Automated  or  scripted  

exfiltra$on  Data  

compressed  Data  encrypted  

Data  size  limits  

Data  staged  Exfil  over  C2  channel  Exfil  over  alternate  

channel  to  C2  network  

Exfil  over  other  network  medium  

Exfil  over  physical  medium  

From  local  system  

From  network  resource  

From  removable  media  

Scheduled  transfer  

Local  networking  enumera$on  

Windows  admin  shares  

Standard  non-­‐app  layer  protocol  

Uncommonly  used  port  

Web  shell  

Creden$al  manipula$on  

Timestomp  Updated  Figure  Coming  Soon  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

9  

Page 10: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Use  Cases  

  Gap  analysis  with  current  defenses    Priori%ze  detec%on/mi%ga%on  of  heavily  used  techniques    Informa%on  sharing    Track  a  specific  adversary’s  set  of  techniques    Simula%ons,  exercises    New  technologies,  research  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

10  

Page 11: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

No%onal  Defense  Gaps  Persistence   Privilege  

Escala$on  Creden$al  Access  

Host  Enumera$on  

Defense  Evasion  

Lateral  Movement   Execu$on   C2   Exfiltra$on  

Accessibility  Features  AddMonitor  

DLL  Search  Order  Hijack  Edit  Default  File  Handlers  

Legi$mate  Creden$als  

New  Service  Path  Intercep$on  Scheduled  Task  

Service  File  Permission  Weakness  

Creden$al  Dumping  

DLL  Side-­‐Loading  Disabling  

Security  Tools  

File  System  Logical  Offsets  

Account  enumera$on  

Creden$als  in  Files  

Network  Sniffing  User  

Interac$on  

Binary  Padding  File  system  enumera$on  

Group  permission  enumera$on  

Local  network  connec$on  enumera$on  

Opera$ng  system  

enumera$on  

Owner/User  enumera$on  

Process  enumera$on  

Security  sojware  

enumera$on  

Service  enumera$on  Window  

enumera$on  

Applica$on  deployment  sojware  

Exploita$on  of  Vulnerability  

Logon  scripts  

Pass  the  hash  

Pass  the  $cket  Peer  

connec$ons  Remote  Desktop  Protocol  

Remote  Services  

Replica$on  through  

removable  media  Shared  webroot  

Taint  shared  content  

Windows  management  instrumenta$on  

Windows  remote  management  

Command  Line  

File  Access  PowerShell  Process  

Hollowing  Registry  Rundll32  

Scheduled  Task  

Service  Manipula$on  Third  Party  Sojware  

Commonly  used  port  

Comm  through  removable  media  

Custom  applica$on  

layer  protocol  

Custom  encryp$on  cipher  Data  

obfusca$on  Fallback  channels  Mul$band  comm  

Mul$layer  encryp$on  

Peer  connec$ons  Standard  app  layer  protocol  

Standard  encryp$on  cipher  

Automated  or  scripted  

exfiltra$on  Data  

compressed  Data  

encrypted  Data  size  limits  

Data  staged  Exfil  over  C2  channel  Exfil  over  alternate  

channel  to  C2  network  

Exfil  over  other  network  medium  

Exfil  over  physical  medium  

From  local  system  

From  network  resource  

From  removable  media  

Scheduled  transfer  

Local  networking  enumera$on  

Windows  admin  shares  

Standard  non-­‐app  layer  protocol  

Uncommonly  used  port  

Detect   Par$ally  Detect   No  Detect  

Creden$al  manipula$on  

BIOS  

Hypervisor  Rootkit  

Logon  Scripts  

Master  Boot  Record  

Mod.  Exist’g  Service  

Registry  Run  Keys  

Serv.  Reg.  Perm.  Weakness  

Shortcut  Modifica$on  

Windows  Mgmt  Instr.  Event  Subsc.  

Winlogon  Helper  DLL  

Bypass  UAC  DLL  Injec$on  

Exploita$on  of  Vulnerability  

Indicator  blocking  on  

host  Indicator  

removal  from  tools  

Indicator  removal  from  

host  Masquerad-­‐ing  

NTFS  Extended  Aiributes  Obfuscated  Payload  

Process  Hollowing  Rootkit  

Rundll32  Scrip$ng  Sojware  Packing  

Web  shell  

Timestomp  

Updated  Figure  Coming  Soon  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

11  

Page 12: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Adversary  Visibility  at  the  Perimeter  Persistence   Privilege  

Escala$on  Creden$al  Access  

Host  Enumera$on  

Defense  Evasion  

Lateral  Movement   Execu$on   C2   Exfiltra$on  

Accessibility  Features  AddMonitor  

DLL  Search  Order  Hijack  Edit  Default  File  Handlers  

Legi$mate  Creden$als  

New  Service  Path  Intercep$on  Scheduled  Task  

Service  File  Permission  Weakness  

Creden$al  Dumping  

DLL  Side-­‐Loading  Disabling  

Security  Tools  

File  System  Logical  Offsets  

Sojware  Packing  

Account  enumera$on  

Creden$als  in  Files  

Network  Sniffing  User  

Interac$on  

Binary  Padding  File  system  enumera$on  

Group  permission  enumera$on  

Local  network  connec$on  enumera$on  

Opera$ng  system  

enumera$on  

Owner/User  enumera$on  

Process  enumera$on  

Security  sojware  

enumera$on  

Service  enumera$on  Window  

enumera$on  

Applica$on  deployment  sojware  

Exploita$on  of  Vulnerability  

Logon  scripts  

Pass  the  hash  

Pass  the  $cket  Peer  

connec$ons  Remote  Desktop  Protocol  

Remote  Services  

Replica$on  through  

removable  media  Shared  webroot  

Taint  shared  content  

Windows  management  instrumenta$on  

Windows  remote  management  

Command  Line  

File  Access  PowerShell  Process  

Hollowing  Registry  Rundll32  

Scheduled  Task  

Service  Manipula$on  Third  Party  Sojware  

Commonly  used  port  

Comm  through  removable  media  

Custom  applica$on  

layer  protocol  

Custom  encryp$on  cipher  Data  

obfusca$on  Fallback  channels  Mul$band  comm  

Mul$layer  encryp$on  

Peer  connec$ons  Standard  app  layer  protocol  

Standard  encryp$on  cipher  

Automated  or  scripted  

exfiltra$on  Data  

compressed  Data  encrypted  

Data  size  limits  

Data  staged  Exfil  over  C2  channel  Exfil  over  alternate  

channel  to  C2  network  

Exfil  over  other  network  medium  

Exfil  over  physical  medium  

From  local  system  

From  network  resource  

From  removable  media  

Scheduled  transfer  

Local  networking  enumera$on  

Windows  admin  shares  

Standard  non-­‐app  layer  protocol  

Uncommonly  used  port  

Full  Visibility   Par$ally  Visibility   No  Visibility  

Creden$al  manipula$on  

BIOS  

Hypervisor  Rootkit  

Logon  Scripts  

Master  Boot  Record  

Mod.  Exist’g  Service  

Registry  Run  Keys  

Serv.  Reg.  Perm.  Weakness  

Shortcut  Modifica$on  

Windows  Mgmt  Instr.  Event  Subsc.  

Winlogon  Helper  DLL  

Bypass  UAC  DLL  Injec$on  

Exploita$on  of  Vulnerability  

Indicator  blocking  on  

host  Indicator  

removal  from  tools  

Indicator  removal  from  

host  Masquerad-­‐ing  

NTFS  Extended  Aiributes  Obfuscated  Payload  

Process  Hollowing  Rootkit  

Rundll32  Scrip$ng  Sojware  Packing  

Web  shell  

Timestomp  

Updated  Figure  Coming  Soon  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

12  

Page 13: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

•  Adversary  has  the  most  la$tude  for  varia$on  at  the  network  level  

•  Firewall,  IDS/IPS,  neclow,  proxy,  mail  gateway,  WCF,  SSL  MitM,  protocol  decoders,  anomaly  detec$on  etc…  

•  All  par$al  solu$ons  ‒  Don’t  add  up  to  a  complete  one  

•  Ojen  require  specific  prior  knowledge  ‒ IPs,  domains,  malware  changed  easily  ‣  Sector,  organiza%on  specific  infrastructure  ‣  Frequently  modify  tools  ‣  Use  legi%mate  channels  

•  Beier  coverage  with  host  sensing  

C2   Exfiltra$on  

Commonly  used  port  

Comm  through  removable  media  

Custom  applica$on  

layer  protocol  

Custom  encryp$on  cipher  Data  

obfusca$on  Fallback  channels  Mul$band  comm  

Mul$layer  encryp$on  

Peer  connec$ons  Standard  app  layer  protocol  

Standard  encryp$on  cipher  

Automated  or  scripted  

exfiltra$on  Data  

compressed  Data  encrypted  

Data  size  limits  

Data  staged  Exfil  over  C2  channel  Exfil  over  alternate  

channel  to  C2  network  

Exfil  over  other  network  medium  

Exfil  over  physical  medium  

From  local  system  

From  network  resource  

From  removable  media  

Scheduled  transfer  

Standard  non-­‐app  layer  protocol  

Uncommonly  used  port  

Defense  Evasion  

Legit.  Cred.  

DLL  Side-­‐Loading  Disabling  

Security  Tools  

File  System  Logical  Offsets  

Binary  Padding  

Bypass  UAC  DLL  Injec$on  Indicator  

blocking  on  host  

Indicator  removal  from  

tools  Indicator  

removal  from  host  

Masquerad-­‐ing  

NTFS  Extended  Aiributes  Obfuscated  Payload  

Process  Hollowing  Rootkit  

Rundll32  Scrip$ng  Sojware  Packing  

Timestomp  

Updated  Figures  Coming  Soon  Adversary  Visibility  At  The  Perimeter  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

13  

Page 14: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Tac%c  Breakdown    

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

Persistence  

20  Privilege  

Escala%on   14  Creden%al  Access   5  Host  Enumera%on   11  Defense  Evasion   19  

Lateral  Movement   14  Execu%on  

11  Command  and  Control   13  Exfiltra%on  

13  

Updated  Figures  Coming  Soon  

14  

Page 15: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Publicly  Known  Adversary  Use  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

Persistence  

20        8  Privilege  

Escala%on   14        9  Creden%al  Access   5            5  Host  Enumera%on   11        10  Defense  Evasion   19        14  

Lateral  Movement   14        8  Execu%on  

11        7  Command  and  Control   13        12  Exfiltra%on  

13        10  

Updated  Figures  Coming  Soon  

15  

Page 16: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Publically  Reported  Technique  Use  Persistence   Privilege  

Escala$on  Creden$al  Access  

Host  Enumera$on  

Defense  Evasion  

Lateral  Movement   Execu$on   C2   Exfiltra$on  

Accessibility  Features  AddMonitor  

BIOS  

DLL  Search  Order  Hijack  Edit  Default  File  Handlers  

Hypervisor  Rootkit  

Legi$mate  Creden$als  

Logon  Scripts  

Master  Boot  Record  

Mod.  Exist’g  Service  

New  Service  Path  Intercep$on  

Registry  Run  Keys  

Scheduled  Task  

Service  File  Permission  Weakness  

Serv.  Reg.  Perm.  Weakness  

Shortcut  Modifica$on  

Windows  Mgmt  Instr.  Event  Subsc.  

Winlogon  Helper  DLL  

Bypass  UAC  DLL  Injec$on  

Exploita$on  of  Vulnerability  

Creden$al  Dumping  

DLL  Side-­‐Loading  Disabling  

Security  Tools  

File  System  Logical  Offsets  

Indicator  blocking  on  

host  Indicator  

removal  from  tools  

Indicator  removal  from  

host  Masquerad-­‐ing  

NTFS  Extended  Aiributes  Obfuscated  Payload  

Process  Hollowing  Rootkit  

Rundll32  Scrip$ng  Sojware  Packing  

Account  enumera$on  

Creden$als  in  Files  

Network  Sniffing  User  

Interac$on  

Binary  Padding  File  system  enumera$on  

Group  permission  enumera$on  

Local  network  connec$on  enumera$on  

Opera$ng  system  

enumera$on  

Owner/User  enumera$on  

Process  enumera$on  

Security  sojware  

enumera$on  

Service  enumera$on  Window  

enumera$on  

Applica$on  deployment  sojware  

Exploita$on  of  Vulnerability  

Logon  scripts  

Pass  the  hash  

Pass  the  $cket  Peer  

connec$ons  Remote  Desktop  Protocol  

Remote  Services  

Replica$on  through  

removable  media  Shared  webroot  

Taint  shared  content  

Windows  management  instrumenta$on  

Windows  remote  management  

Command  Line  

File  Access  PowerShell  Process  

Hollowing  Registry  Rundll32  

Scheduled  Task  

Service  Manipula$on  Third  Party  Sojware  

Commonly  used  port  

Comm  through  removable  media  

Custom  applica$on  

layer  protocol  

Custom  encryp$on  cipher  Data  

obfusca$on  Fallback  channels  Mul$band  comm  

Mul$layer  encryp$on  

Peer  connec$ons  Standard  app  layer  protocol  

Standard  encryp$on  cipher  

Automated  or  scripted  

exfiltra$on  Data  

compressed  Data  encrypted  

Data  size  limits  

Data  staged  Exfil  over  C2  channel  Exfil  over  alternate  

channel  to  C2  network  

Exfil  over  other  network  medium  

Exfil  over  physical  medium  

From  local  system  

From  network  resource  

From  removable  media  

Scheduled  transfer  

Local  networking  enumera$on  

Windows  admin  shares  

Standard  non-­‐app  layer  protocol  

Uncommonly  used  port  

Web  shell  

Creden$al  manipula$on  

Timestomp  

Updated  Figure  Coming  Soon  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

16  

Page 17: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Public  Website  –  ANack.Mitre.Org  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

17  

Page 18: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Defender’s  Problem:  Adversaries  Blend  In  

  ANackers  post-­‐exploit  look  very  similar  to  normal  users    Tradi%onal  efforts  aren’t  effec%ve  at  finding  an  ac%ve  intrusion  –  Internal  tools  look  for  exploit,  compliance,  or  C2  channel  –  Indicator  sharing  only  covers  what’s  known  and  is  fragile  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

18  

Page 19: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

End-­‐Point  Sensing  

Addressing the ATT&CK TTPs requires host-level sensing beyond typical antivirus and host-based intrusion sensors

Many more opportunities to catch adversaries operating inside networks than at the perimeter

Better awareness of compromise severity and scope –  Verizon: 85% of IP thefts lacked specific knowledge of what was taken

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

19  

Page 20: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Sensor  Op%ons  

  COTS  –  Bit9,  Countertack,  Mandiant,  CrowdStrike,  Cylance,    EMC,  others  

  Built-­‐in  and  OS  Integrated  –  Event  Tracing  for  Windows,  Sysmon,  Autoruns,  Event  Logs  

     

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

20  

Page 21: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

The  Fort  Meade  eXperiment  (FMX)  

MITRE’s  Fort  Meade  site  

About  250  unclassified  computers  

Primarily  user  desktops  running  Windows  7  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

21  

Page 22: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

FMX:  Analy%cs  Based  On  Threats  

  Develop  analy%cs  based  on  observed  adversary  TTPs  

  U%lize  na%ve  Windows  logging/tools  

  Decouple  sensors  from  analy%c  plaqorm  

  Data  model  improves  exportability  and  flexibility  of  analy%cs  

  Create  a  methodology  that  doesn’t  overwhelm  analysts  

 

Not  This!  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

22  

Page 23: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Sensors:  FY15  

  Host-­‐based  Sensors  –  Microsoi  Sysmon  –  ETWmon  –  Salt  (Autoruns)  –  Hosqlows  

 

  Network  Sensors  –  PCAP  –  Neqlows  

Updated  Sensor  List  Coming  Soon  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

23  

Page 24: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Microsoi  Sysmon  

Explorer.exe   cmd.exe  

Outlook.exe   Acrobat.exe   cmd.exe  

Svchost.exe   wmiprvse.exe   cmd.exe  

Provides  details    on  processes  

   

Process  chains  provide  context  around  system  ac$vity  

   

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

24  

Page 25: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Hosqlows  

Improved  visibility  

Pivot  point  between  host  and  network  data    

Metadata  on  network  connec%ons  

Addi%onal  Informa%on  Coming  Soon  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

25  

Page 26: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Analy%c  Lessons  Captured  

Tested,  shareable  analy%cs  that  are  effec%ve  at  finding  aNacker  behavior  are  the  output  of  FMX  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

26  

Page 27: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Data  Model  

index=old_sensor  type=PROC_EVENT_CREATE  hostname=A4123456.mitre.org  imagepath=“c:\loca%on\foo.exe”  

index=sysmon  Message=“Process  Create”  ComputerName=A4123456.mitre.org  Image=“c:\loca%on\foo.exe”  

evenNype=process_start  host_name=A4123456  image_path=“c:\loca%on\foo.exe”  

Current  eveniypes:  file_access,  process_start,    process_stop,  flow,  logon    

Data  Model  Implementa%on    Example  Coming  Soon  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

27  

Page 28: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

CAR  Instan%a%on  With  Data  Model  

CAR-­‐2014-­‐07-­‐001:  Search  Path  Intercep$on  Hypothesis:  As  described  by  ATT&CK,  one  method  of  escala%on  is  intercep%ng  the  search  path  for  services,  so  that  legi%mate  services  point  to  the  binary  inserted  at  an  intercepted  loca%on.  This  can  be  done  when  there  are  spaces  in  the  path  and  it  is  unquoted.      Instan$a$on:  evenNype=process_start  parent_image_path="*\\system32\\services.exe"  command_line!="\"*"  command_line="*  *"  |  rex  field=image_path      ".*\\\(?<img_exe>.*)"  |  rex  field=img_exe  "(?<img_base>.*)\..*"  |  where  NOT  like(lower(command_line  ),  lower("%"+img_exe+"%"))  AND  like(lower(command_line),  lower("%"+img_base+"%"))  |  table  _%me  hostname  ppid  pid  parent_image_path  image_path  command_line  img_exe  

More  Informa%on  About  CAR  Including  Example  Analy%cs  Coming  Soon  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

28  

Page 29: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Evalua%on  With  Cyber  Games  

  Red/Blue  Team  opera$ons  within  FMX  environment  –  Emulated  adversary  –  Asynchronous  –  Designed  to  push  

analy%c  boundaries  

Source:  Tron,  Walt  Disney  Pictures  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

29  

Page 30: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

FMX  Analy%c  Development  Cycle  

What  ques$ons  do  we  want  to  

ask?  

Sensor  Development  

(maybe)  

Analy$c  Development  

Red  Team  Tes$ng  

Blue  Team  

What  did  we  miss?  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

30  

Page 31: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

FMX  Analy%c  Development  Cycle  

Analy%c  Development  Example  Coming  Soon  

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

31  

Page 32: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

Ques%ons?  

 

 

ATT&CK  [email protected]  

 

Public  website:  

aNack.mitre.org  

 

 

 

FMX  [email protected]  

 

©  2015  The  MITRE  Corpora%on.  All  rights  reserved.      For  Public  Release  

Page 33: Copyright © 2016 Splunk | 1 | Inc. Detec%ng(The(Adversary ... · Listof(techniques(available(to(adversaries(for(each(phase(3. ... Bypass’UAC’ ... typical antivirus and host-based

| 33 |

THANK YOU