From ae1c7cb14ccfa4dd43ed55287d372f1903b4493e Mon Sep 17 00:00:00 2001 From: Andras Iklody Date: Mon, 28 Oct 2019 11:15:00 +0100 Subject: [PATCH] Update 2019-10-27-visualising_common_patterns_attack.md --- ...0-27-visualising_common_patterns_attack.md | 32 +++++++++---------- 1 file changed, 16 insertions(+), 16 deletions(-) diff --git a/_posts/2019-10-27-visualising_common_patterns_attack.md b/_posts/2019-10-27-visualising_common_patterns_attack.md index a4eb789..226a31d 100644 --- a/_posts/2019-10-27-visualising_common_patterns_attack.md +++ b/_posts/2019-10-27-visualising_common_patterns_attack.md @@ -6,16 +6,16 @@ featured: /assets/images/misp/blog/visualisation_cylance_attack/actor_delta.png # Visualising common patterns within MISP and ATT&CK data -Having access to a large amount of Threat information through MISP Threat Sharing communities gives you great opportunities to bring this information together and start the next stop of trying to understand how the data fits together and forms a bigger story. We are transforming technical data or indicators of compromise (IOCs) into Cyber Threat Intel. This is where the analytical challenge begins. +Having access to a large amount of Threat information through MISP Threat Sharing communities, gives you outstanding opportunities to aggregate this information and take the process of trying to understand how all this data fits together tell a broader story to the next level. We are transforming technical data or indicators of compromise (IOCs) into Cyber Threat Intel. This is where the analytical challenge begins. -In his [Psychology of Intelligence Analysis](https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/PsychofIntelNew.pdf) book Richards Heuer, a reference in intelligence analysis, describes some of the power and limitations our mental machinery has. While discussing the Short Term Memory, Long Term Memory and Working Memory he concludes the following: +In his [Psychology of Intelligence Analysis](https://www.cia.gov/library/center-for-the-study-of-intelligence/csi-publications/books-and-monographs/psychology-of-intelligence-analysis/PsychofIntelNew.pdf) book, Richards Heuer, a reference in intelligence analysis, describes some of the power and limitations our mental machinery has. While discussing the Short Term Memory, Long Term Memory and Working Memory he concludes the following: > A well-known article written over 40 years ago, titled “The Magic Number Seven—Plus or Minus Two,” contends that **seven—plus or minus two—is the number of things people can keep in their head all at once**. That limitation on working memory is the source of many problems. People have difficulty grasping a problem in all its complexity. This is why we sometimes have trouble making up our minds. For example, we think first about the arguments in favor, and then about the arguments against, and we can’t keep all those pros and cons in our head at the same time to get an overview of how they balance off against each other. -The recommended technique for coping with this limitation is to externalize the problem. We need to get it out of the human head and down in a form that simplifies the story, shows the main elements and how they related to each other. -In this article we will be using visualisation techniques to help us better show us Cyber Threat information shared through [MISP](https://github.com/MISP/MISP) and tagged with [MITRE ATT&CK](https://attack.mitre.org/) within a visualisation tool called [Maltego](https://www.paterva.com/buy/maltego-clients/maltego.php). +The recommended technique for coping with this limitation is to externalise the problem. We need to get it out of the human head into a form that simplifies the story, shows the main elements and how they related to each other. +In this article we will be using visualisation techniques to help us better explore Cyber Threat information shared through [MISP](https://github.com/MISP/MISP) and tagged with [MITRE ATT&CK](https://attack.mitre.org/) techniques, all within a visualisation tool called [Maltego](https://www.paterva.com/buy/maltego-clients/maltego.php). ## Getting started -To get started you will need access to a MISP Threat Sharing community, or run your own instance. As quickstart you can use the [MISP Training VM](https://www.misp-project.org/download/#virtual-images) and download data from the [CIRCL OSINT feed](https://www.misp-project.org/feeds/#default-feeds-available-in-misp). +To get started you will need access to a MISP Threat Sharing community, or run your own instance. As quickstart, you can use the [MISP Training VM](https://www.misp-project.org/download/#virtual-images) and download data from the [CIRCL OSINT feed](https://www.misp-project.org/feeds/#default-feeds-available-in-misp). You will want to download the [Maltego CE](https://www.paterva.com/buy/maltego-clients/maltego-ce.php) (free, limited) or the [classic](https://www.paterva.com/buy/maltego-clients/maltego.php) (paid) edition and install the open source [MISP-Maltego](https://github.com/MISP/MISP-maltego/blob/master/doc/README.md#installation) transform. @@ -24,41 +24,41 @@ We will be looking at a report of attacks called "[PcShare Backdoor Attacks Targ ![associated ATT&CK techniques](/assets/images/misp/blog/visualisation_cylance_attack/tags.png) ## Analysis and Visualisation -In addition to the technical report of these attacks and the used malware, the author documented 16 related ATT&CK Techniques. Interestingly MITRE associated 18 ATT&CK techniques to this actor. -An avid reader will immediately notice the reports has 2 techniques less than the actor described by MITRE. +In addition to the technical report of these attacks and the leveraged malware, the author documented 16 related ATT&CK Techniques. Interestingly MITRE associated 18 ATT&CK techniques to this actor. +An avid reader will immediately notice the report has 2 techniques fewer than the actor described by MITRE. **Is this correct or is the reality completely different?** -Keeping in mind the limitations of our working memory (7+-2 items) we will need extra external support to compare the techniques. While we could take two papers and compare both lists taking 5 minutes, let's do the exercise in a more visual and dynamic way. +Keeping in mind the limitations of our working memory (7+-2 items) we will need extra external support to compare the techniques. Whilst we could indeed take two papers and compare both lists for the duration of 5 minutes, let us do the exercise in a more visual and dynamic way. **Open Maltego**, and create a **MISPEvent entity** with the MISP event number on your MISP server (for me this is `63423`). **Right click** on the event and choose **"Event To Galaxies"**. ![Event To Galaxies](/assets/images/misp/blog/visualisation_cylance_attack/to_galaxies.png) -We now have a first visual view of the Tags that were attached to the report. Select now the threat actor and choose again **Galaxy to Relations** to expand this using relationships MITRE ATT&CK relationships. +We now have a first visual view of the Tags that were attached to the report. Now, Select the threat actor and choose **Galaxy to Relations** again, in order to expand this using MITRE ATT&CK relationships. We now see a completely new graph which is much less readable. Make sure you configure Maltego to make collections of 4 or more similar entities. You can do this in the toolbar in the top: ![Collections](/assets/images/misp/blog/visualisation_cylance_attack/collections.png) ![visual delta between the report and ATT&CK](/assets/images/misp/blog/visualisation_cylance_attack/actor_delta.png) -**Suddenly our graph becomes much more readable and we see in a glance that our initial intuition of two missing techniques was actually completely wrong !** -The Cylance report of these attacks does NOT have two (2) techniques less than expected. Actually only five (5) are common with what MITRE documented ! Thirteen (13) are only present in the MITRE documentation and eleven (11) are not associated with this actor by MITRE. Zooming in allows us to see the details of which fall where: +**Suddenly our graph becomes much more readable and we see at a glance that our initial intuition of two missing techniques was actually completely wrong !** +The Cylance report of these attacks does NOT have two (2) techniques fewer than expected. Actually, only five (5) are common with what MITRE documented ! Thirteen (13) are only present in the MITRE documentation and eleven (11) are not associated with this actor by MITRE. Zooming in allows us to see the details: ![visual delta between the report and ATT&CK](/assets/images/misp/blog/visualisation_cylance_attack/actor_delta_zoom.png) ## What does this mean? Does this mean Cylance or MITRE are wrong? Not necessarily, many factors can explain this, for example: - - When creating and updating ATT&CK MITRE only had a certain knowledge of each actor. They only saw a piece of the puzzle. - - Actor change their behavior and their TTPs evolve over time - - We have also seen that tagging techniques can be a very subjective exercise. Additionally, the current techniques are sometimes very generic and can be understood differently by one or another. To address this challenge MITRE has been developing [sub-techniques](https://medium.com/mitre-attack/attack-sub-techniques-preview-b79ff0ba669a). + - When creating and updating ATT&CK, MITRE only had incomplete knowledge of each actor. They only saw a piece of the puzzle. + - Actors change their behaviour and their TTPs evolve over time + - We have also seen that tagging techniques can be a very subjective exercise. Additionally, the current techniques are sometimes very generic and their understanding is not universal. To address this challenge MITRE has been developing [sub-techniques](https://medium.com/mitre-attack/attack-sub-techniques-preview-b79ff0ba669a). - ... ## The beginning of a long journey -This example is only a start and beginning of a long journey of analysing and understanding the data which is available to us. +This example is only the beginning of a long journey of analysing and understanding the data which is available to us. -We always need to keep in mind that we only see a fraction of the total story. Only by combining what you see in your network or constituency and what others see on theirs we will be able to better analyse and understand what is going on. This is yet another good reason to share Cyber Threat Information with trusted communities. +We always need to keep in mind that we only see a fragment of the entire story. Only by combining what you see in your network or constituency and what others see in theirs will we be able to better analyse and understand what is going on. This is yet another good reason to share Cyber Threat Information with trusted communities. We also know we have limited mental capabilities and can be assisted by technology to help ourselves with this challenge, for example with graphing and visualisation tools linked to our favorite MISP Threat Sharing tool !