SlideShare a Scribd company logo
Jakarta, Indonesia
Adversary Emulation and Its
Importance for Improving Security
Posture in Organization
CDEF Meetup
25th February 2021
Digit Oktavianto
@digitoktav
https://medium.com/@digit.oktavianto
https://blueteam.id/ 1
25/02/2021
Jakarta, Indonesia
https://blueteam.id/
T1033 : System Owner/User Discovery
 Infosec Consulting Manager at Mitra Integrasi Informatika
 Co-Founder BlueTeam.ID (https://blueteam.id)
 Born to be DFIR Team
 Community Lead @ Cyber Defense Community Indonesia
 Member of Indonesia Honeynet Project
 Opreker and Researcher
 {GCIH | GMON | GCFE | GICSP | CEH | CSA | ECSA | ECIH |
CHFI | CTIA | ECSS} Certifications Holder
2
25/02/2021
Jakarta, Indonesia
•What is Adversary Emulation About?
• Adversary Emulation vs Adversary Simulation
• Phase of Security Assessment
•Benefit and Importance of Adversary Emulation
•Developing Adversary Emulation Plan
•Getting Started with Adversary Emulation
https://blueteam.id/
Agenda
3
25/02/2021
Jakarta, Indonesia
What is Adversary
Emulation About?
https://blueteam.id/ 4
25/02/2021
Jakarta, Indonesia
Introduction : Adversary Emulation
Adversary Emulation is a type of red teaming activities which
focuses on the emulation of a specific adversaries / threat
actor and leverage the threat intelligence to define the
behavior and TTPs that will be used in the emulation plan.
https://blueteam.id/ 5
25/02/2021
Jakarta, Indonesia
Threat Informed Defense
Threat-informed defense applies a deep understanding of
adversary tradecraft and technology to protect against, detect,
and mitigate cyber-attacks. It's a community-based approach
to a worldwide challenge.
More info : https://www.mitre.org/news/focal-points/threat-informed-defense
https://blueteam.id/ 6
25/02/2021
Jakarta, Indonesia
Threat Informed Defense
MITRE Threat Informed Defense Research Focus :
• Increase the global understanding of cyber adversaries and their tradecraft by
expanding upon the MITRE ATT&CK knowledge base
• Advance threat-informed defense in cyber operations with open-source software,
methodologies, and frameworks
• Publish data sets critical to better understanding adversaries and their
movements
• The goal is to change the game on adversaries by relentlessly improving our
collective ability to prevent, detect, and respond to cyber attacks.
https://blueteam.id/ 7
25/02/2021
Jakarta, Indonesia
Adversary Emulation vs Adversary Simulation
Merriam-Webster dictionary translation of emulation and simulation
https://blueteam.id/ 8
25/02/2021
Jakarta, Indonesia
Adversary Emulation vs Adversary Simulation
• Adversary Emulation : a process of imitate the activities or mimicking or copying the
adversaries or threat actor behavior.
• Adversary Simulation : a process of simulate or represent the functioning of
adversaries or threat actor behavior when attacking the target.
Tim MalcomVetter mentioned in his blog post (https://malcomvetter.medium.com/emulation-
simulation-false-flags-b8f660734482) about this :
• Emulation implies an EXACTNESS to the copy, whereas Simulation only implies SIMILARITY
with some freedom to be different. I am totally agree with his opinion.
https://blueteam.id/ 9
25/02/2021
Jakarta, Indonesia
Introduction : Adversary Emulation
https://blueteam.id/ 10
25/02/2021
Phase of Security Assessment
Jakarta, Indonesia
Introduction : Adversary Emulation
https://blueteam.id/ 11
25/02/2021
Jorge Orchilles’s Slide About Adversary Emulation
(https://www.slideshare.net/jorgeorchilles/adversary-emulation-and-red-team-exercises-educause)
Jakarta, Indonesia
Introduction : Adversary Emulation
• Jorge Orchilles and Scythe in their blogpost differentiate term of red teaming,
adversary emuation / simulation and purple teaming in this statement :
• “Adversary Emulations may be performed in a blind manner (Red Team
Engagement) or non-blind (Purple Team) with the Blue Team having full
knowledge of the engagement.”
• Based on that statement, it can be conclude that Red Teaming and Purple
Teaming is part of Adversary Emulation. It depends on the engagement, if the
engagement performed without Blue Team knowing the activities, than it is called
as red teaming. If the engagement involved blue team, then it is called purple
teaming.
https://blueteam.id/ 12
25/02/2021
Jakarta, Indonesia
Benefit and Importance of
Adversary Emulation
https://blueteam.id/ 13
25/02/2021
Jakarta, Indonesia
Benefit and Importance of Adversary Emulation
Red Team using Adversary Emulation plan to develop an attack emulation and/or
simulation and execute it against your enterprise infrastructure.
These activities leverage real-world attacks and TTPs by Threat Actor, so you can
identify and finding the gaps in your defense before the actual adversary attacking
your infrastructure.
Adversary Emulation also help security team greater visibility into their
environment.
Performing Adversary Emulation continuously to strengthen and tune your defense
over the time.
https://blueteam.id/ 14
25/02/2021
Jakarta, Indonesia
Benefit and Importance of Adversary Emulation
• Adversary Emulation is just like IR and Tabletop Exercise, but in different perspective. This
exercise allows your organization to test your security team against the latest threats used by real
threat actor which posing the greatest risk to your organization in specific industry.
• Adversary emulation giving proof of how a targeted attacker could penetrate your infrastructure
and compromise sensitive assets, and/or documentation.
• Adversary emulation showing that defensive capabilities succeed / failed in preventing +
responding the simulated attack. It is giving you analysis of your organization’s strengths and
weaknesses based on the result of the simulation.
• Adversary emulation can help you not only to prioritize current existing technology capability
improvement, but also also giving you a recommendation for future investments and provide
recommendations for maturing your cybersecurity posture.
• A focus on objective-based testing demonstrates the effectiveness of your security controls
• Adversary Emulation can help you to measure your organization’s cybersecurity maturity level by
evaluating it across the kill chain phases of the MITRE ATT&CK® framework or other relevant
frameworks.
https://blueteam.id/ 15
25/02/2021
Jakarta, Indonesia
Developing Adversary
Emulation Plan
https://blueteam.id/ 16
25/02/2021
Jakarta, Indonesia
Developing Adversary Emulation Plan
https://blueteam.id/ 17
25/02/2021
Adam Pennington’s Slide : Leveraging MITRE ATT&CK for Detection, Analysis & Defense
(https://www.slideshare.net/AdamPennington4/rhisac-summit-2019-adam-pennington-leveraging-mitre-attck-for-detection-
analysis-defense)
Jakarta, Indonesia
Developing Adversary Emulation Plan
I quote a paragraph from Tim MalcomVetter About Emulation Plan in Practice
(https://malcomvetter.medium.com/emulation-simulation-false-flags-b8f660734482):
“In practice, emulating is very hard. First, not all threat actors have publicly or privately available
intelligence in the format necessary to complete all of the threat actors’ steps with the precision
required to meet the definition. Second, even for those that do, certain key steps may be out of
bounds, legally, for the person “replaying them” (such as compromising third party infrastructure).
Third, the “programmed TTPs” were collected at a single point in time, and techniques that were
used during that string of events may not be reused in the future by that threat actor, so replaying
them with precision may not be that valuable of an exercise.”
https://blueteam.id/ 18
25/02/2021
Jakarta, Indonesia
Developing Adversary Emulation Plan
Adversary emulation plans are based on known-adversary TTPs (Tactic, Technique, and Procedure) and designed to
empower red teams to emulate a specific threat actor in order to test and evaluate defensive capabilities from a threat-
informed perspective.
• Each emulation plan focuses on a specific named threat actor.
• Each adversary emulation plan is gathered from threat intelligence reports and other artifacts that capture and describe
breaches and campaigns publicly attributed to a specific named threat actor
• To develop each plan, Red Team should do the research and model each threat actor, focusing not only on what they do
(e.g.: gather credentials from victims) but also how (using what specific tools/utilities/commands?) and when (during what
stage of a breach?)
• Red Team then develop the emulation content that mimics the underlying behaviors utilized by the threat actor
• To describe the details flow of emulation plan, Red Team should develop the operational flow which provides a high-level
summary of the captured scenario(s).
• The scenario(s) of emulation plan is broken down into step-by-step procedures provided in both human and machine-
readable formats. (like .yaml in Caldera for example). Scenarios can be executed end-to-end or as individual tests.
• The emulation plan scenarios will vary based on the adversary and available intelligence, but typically follow a sequential
progression of how the actor breaches then works towards achieving their operational objectives within a victim
environment
https://blueteam.id/ 19
25/02/2021
Jakarta, Indonesia
Developing Adversary Emulation Plan
For example, the MITRE The ATT&CK Evaluations of APT29 Emulation Plan
(https://github.com/mitre-attack/attack-
arsenal/blob/master/adversary_emulation/APT29/Emulation_Plan/APT29_EmuPla
n.pdf) signaled a significant evolution to the process and established a close-to-
ideal structure of components that made up the emulation plan. Those were:
• Intelligence Summary: An overview of the adversary and references to cited
Intelligence
• Operational Flow: Chains techniques together into a logical flow of the major
steps that commonly occur across the selected adversary’s operations
• Emulation Plan: The TTP-by-TTP, command-by-command walkthrough to
implement the adversary’s operational tradecraft as described in the Intelligence
Summary and the Operational Flow
https://blueteam.id/ 20
25/02/2021
Jakarta, Indonesia
Developing Adversary Emulation Plan
https://blueteam.id/ 21
25/02/2021
APT3 Operational Flow
https://attack.mitre.org/resources/adversary-emulation-plans/
Jakarta, Indonesia
Getting Started with The
Adversary Emulation
https://blueteam.id/ 22
25/02/2021
Jakarta, Indonesia
Getting Started with the Adversary Emulation
When starting the Adversary Emulation Exercise, Emulation Plan is one of the most critical part. The
Emulation Plan section is a specific, detailed breakdown of the tactics of the adversary group.
1. For developing the Emulation Plan, red team firstly must gather the threat intelligence document
related to threat actor group that they want to emulate.
2. Red team must identify the tactics the adversary group uses for an attack, along with the particular
techniques and procedures for each tactic. Mostly the TTPs defined based on MITRE ATTCK
Framework as a standard.
3. To detail an emulation plan in exercise, red team must breakdown the tools that they will use to
emulate the particular TTP. This information is available as part of the MITRE ATT&CK description of
the adversary group, and also from Threat Intelligence Report.
4. Red Team also need to build the infrastructure as part of the emulation plan such as C2
Infrastructure, or Infrastructure for collecting sensitive data after exfiltration phase (if any)
5. Execute the emulation plan as procedure and workflow defined in the exercise. Follow up the result
of the exercise.
https://blueteam.id/ 23
25/02/2021
Jakarta, Indonesia
Notable Tools and Resources for Adversary EMulation
Some notable tools for adversary emulation :
• Caldera (MITRE)
• Atomic Red Team (Red Canary)
• APT Simulator
• Red Team Automation (Endgame)
• Infection Monkey (Guardicore)
• Blue Team Toolkit (BT3) (Encripto)
• AutoTTP (https://github.com/jymcheong/AutoTTP)
• Purple Team ATT&CK Automation (https://github.com/praetorian-inc/purple-team-attack-
automation)
• ATTPwn (https://github.com/ElevenPaths/ATTPwn)
• PurpleSharp (https://github.com/mvelazc0/PurpleSharp)
• Prelude Operator (https://www.prelude.org/)
https://blueteam.id/ 24
25/02/2021
Jakarta, Indonesia
Notable Tools and Resources for Adversary EMulation
Some notable tools for developing adversary emulation :
• MITRE ATT&CK Navigator
• NSA Unfetter (https://nsacyber.github.io/unfetter/)
• MITRE Cyber Analytical Repository (https://car.mitre.org/)
• VECTR (More into for your Purple Teaming)
• _YOUR THREAT INTEL REPORT_ Provider
https://blueteam.id/ 25
25/02/2021
Jakarta, Indonesia
• Adversary emulation is needed by organization to fill the gaps for their current existing
security assessment activity
• Adversary emulation is HARD. Combining the threat intelligence and Adversary TTPs is
not a simple task to do.
• Threat-informed defense approach needed by every organization to get a deep
understanding of adversary tradecraft and technology to protect against, detect, and
mitigate cyber-attacks.
• Developing Adversary Emulation Plan is a Critical part in Adversary Emulation Exercise
before the Execution of scenarios defined.
• Adversary Emulation showing that defensive capabilities succeed / failed in preventing +
responding the simulated attack. It is giving you analysis of your organization’s strengths
and weaknesses based on the result of the simulation
• Adversary Emulation can help you to measure your organization’s cybersecurity maturity
level by evaluating it across the kill chain phases of the MITRE ATT&CK framework or
other relevant frameworks.
https://blueteam.id/
TLDR ; Summary and Key Takeaway
26
25/02/2021
Jakarta, Indonesia
THANK YOU
Q & A
https://blueteam.id/ 27
25/02/2021

More Related Content

PDF
Breach and attack simulation tools
PDF
Adversary Emulation and Red Team Exercises - EDUCAUSE
PPTX
Adversary Emulation using CALDERA
PDF
Threat-Based Adversary Emulation with MITRE ATT&CK
PPTX
Adversary Emulation using CALDERA
PDF
Purple Team Exercise Framework Workshop #PTEF
PDF
No Easy Breach DerbyCon 2016
PDF
Adversary Emulation Workshop
Breach and attack simulation tools
Adversary Emulation and Red Team Exercises - EDUCAUSE
Adversary Emulation using CALDERA
Threat-Based Adversary Emulation with MITRE ATT&CK
Adversary Emulation using CALDERA
Purple Team Exercise Framework Workshop #PTEF
No Easy Breach DerbyCon 2016
Adversary Emulation Workshop

What's hot (20)

PPTX
Adversary Emulation and the C2 Matrix
PDF
Adversary Emulation - Red Team Village - Mayhem 2020
PDF
8.8 Las Vegas - Adversary Emulation con C2 Matrix
PDF
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
PDF
Purple Team Exercises - GRIMMCon
PDF
Knowledge for the masses: Storytelling with ATT&CK
PDF
SANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PDF
Threat hunting 101 by Sandeep Singh
PDF
ATT&CK Updates- Defensive ATT&CK
PDF
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
PDF
Application Security | Application Security Tutorial | Cyber Security Certifi...
PPTX
Cyber Threat Hunting Workshop
PDF
Supply Chain Attacks
PPTX
Threat hunting for Beginners
PPTX
Threat hunting - Every day is hunting season
PDF
Automation: The Wonderful Wizard of CTI (or is it?)
PDF
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
PDF
Threat Hunting with Splunk Hands-on
PPTX
Bsides 2019 - Intelligent Threat Hunting
Adversary Emulation and the C2 Matrix
Adversary Emulation - Red Team Village - Mayhem 2020
8.8 Las Vegas - Adversary Emulation con C2 Matrix
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
Purple Team Exercises - GRIMMCon
Knowledge for the masses: Storytelling with ATT&CK
SANS Purple Team Summit 2021: Active Directory Purple Team Playbooks
Effective Threat Hunting with Tactical Threat Intelligence
Threat hunting 101 by Sandeep Singh
ATT&CK Updates- Defensive ATT&CK
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
Application Security | Application Security Tutorial | Cyber Security Certifi...
Cyber Threat Hunting Workshop
Supply Chain Attacks
Threat hunting for Beginners
Threat hunting - Every day is hunting season
Automation: The Wonderful Wizard of CTI (or is it?)
Managing & Showing Value during Red Team Engagements & Purple Team Exercises ...
Threat Hunting with Splunk Hands-on
Bsides 2019 - Intelligent Threat Hunting
Ad

Similar to Adversary Emulation and Its Importance for Improving Security Posture in Organization (19)

PDF
Proactive cyber defence through adversary emulation for improving your securi...
DOCX
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
PPTX
Adversarial Emulation with the C2 Matrix - Wild West WebCastin Fest
PPTX
Adversarial Emulation and the C2 Matrix - Presented at Wild West Hackin Fest ...
PDF
Emulating an Adversary with Imperfect Intelligence
PDF
Cuddling the Cozy Bear Emulating APT29
PPTX
Adversary simulation
PDF
NVISO - A Journey Through Adversary Emulation - Jonas Bauters
PPTX
Adversary Emulation - DerpCon
PPTX
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
PDF
Transforming Adversary Emulation Into a Data Analysis Question
PDF
Evolution of Offensive Assessments - RootCon
PPTX
Check point sandblast threat-emulation-customer-success-presentation
PPTX
Ethical Hacking - Red Team vs Blue Team.pptx
PDF
So you want to be a red teamer
PPTX
Evolution of Offensive Testing - ATT&CK-based Adversary Emulation Plans
PPTX
hai ini ppt aku gatau mohon maaf ya.pptx
PDF
Reaping What They Sow - Hard Lessons Learned Emulating Threat Actors
PDF
External Threat Hunters are Red Teamers
Proactive cyber defence through adversary emulation for improving your securi...
Toward Effective Evaluation of Cyber Defense Threat Based Adversary Emulation...
Adversarial Emulation with the C2 Matrix - Wild West WebCastin Fest
Adversarial Emulation and the C2 Matrix - Presented at Wild West Hackin Fest ...
Emulating an Adversary with Imperfect Intelligence
Cuddling the Cozy Bear Emulating APT29
Adversary simulation
NVISO - A Journey Through Adversary Emulation - Jonas Bauters
Adversary Emulation - DerpCon
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
Transforming Adversary Emulation Into a Data Analysis Question
Evolution of Offensive Assessments - RootCon
Check point sandblast threat-emulation-customer-success-presentation
Ethical Hacking - Red Team vs Blue Team.pptx
So you want to be a red teamer
Evolution of Offensive Testing - ATT&CK-based Adversary Emulation Plans
hai ini ppt aku gatau mohon maaf ya.pptx
Reaping What They Sow - Hard Lessons Learned Emulating Threat Actors
External Threat Hunters are Red Teamers
Ad

More from Digit Oktavianto (11)

PPTX
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
PPTX
What the Hackers Do to Steal the Data?
PPTX
Windows Forensic 101
PPTX
Leverage Endpooint Visibilit with MITRE ATT&CK Framework
PPTX
Information Security Awareness
PDF
Career Opportunities in Information Security Industry
PDF
Cyber Security Attack and Trend
PPT
Malware Analysis
ODP
Kelas Belajar Ubuntu Indonesia - Setup Your Blog Under Ubuntu Server
ODP
Seminar and Workshop Computer Security, BPPTIK Kominfo
PPT
Setup Your Personal Malware Lab
IDSECCONF 2020 : A Tale Story of Building and Maturing Threat Hunting Program
What the Hackers Do to Steal the Data?
Windows Forensic 101
Leverage Endpooint Visibilit with MITRE ATT&CK Framework
Information Security Awareness
Career Opportunities in Information Security Industry
Cyber Security Attack and Trend
Malware Analysis
Kelas Belajar Ubuntu Indonesia - Setup Your Blog Under Ubuntu Server
Seminar and Workshop Computer Security, BPPTIK Kominfo
Setup Your Personal Malware Lab

Recently uploaded (20)

PDF
Spectral efficient network and resource selection model in 5G networks
PPTX
A Presentation on Artificial Intelligence
PDF
KodekX | Application Modernization Development
PDF
Chapter 3 Spatial Domain Image Processing.pdf
PDF
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
PDF
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
PDF
NewMind AI Weekly Chronicles - August'25 Week I
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
PPTX
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
Machine learning based COVID-19 study performance prediction
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PPTX
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
PDF
Modernizing your data center with Dell and AMD
PDF
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
PPT
Teaching material agriculture food technology
Spectral efficient network and resource selection model in 5G networks
A Presentation on Artificial Intelligence
KodekX | Application Modernization Development
Chapter 3 Spatial Domain Image Processing.pdf
TokAI - TikTok AI Agent : The First AI Application That Analyzes 10,000+ Vira...
Bridging biosciences and deep learning for revolutionary discoveries: a compr...
NewMind AI Weekly Chronicles - August'25 Week I
Per capita expenditure prediction using model stacking based on satellite ima...
Build a system with the filesystem maintained by OSTree @ COSCUP 2025
Effective Security Operations Center (SOC) A Modern, Strategic, and Threat-In...
Advanced methodologies resolving dimensionality complications for autism neur...
Machine learning based COVID-19 study performance prediction
Mobile App Security Testing_ A Comprehensive Guide.pdf
The Rise and Fall of 3GPP – Time for a Sabbatical?
NewMind AI Monthly Chronicles - July 2025
Reach Out and Touch Someone: Haptics and Empathic Computing
PA Analog/Digital System: The Backbone of Modern Surveillance and Communication
Modernizing your data center with Dell and AMD
Shreyas Phanse Resume: Experienced Backend Engineer | Java • Spring Boot • Ka...
Teaching material agriculture food technology

Adversary Emulation and Its Importance for Improving Security Posture in Organization

  • 1. Jakarta, Indonesia Adversary Emulation and Its Importance for Improving Security Posture in Organization CDEF Meetup 25th February 2021 Digit Oktavianto @digitoktav https://medium.com/@digit.oktavianto https://blueteam.id/ 1 25/02/2021
  • 2. Jakarta, Indonesia https://blueteam.id/ T1033 : System Owner/User Discovery  Infosec Consulting Manager at Mitra Integrasi Informatika  Co-Founder BlueTeam.ID (https://blueteam.id)  Born to be DFIR Team  Community Lead @ Cyber Defense Community Indonesia  Member of Indonesia Honeynet Project  Opreker and Researcher  {GCIH | GMON | GCFE | GICSP | CEH | CSA | ECSA | ECIH | CHFI | CTIA | ECSS} Certifications Holder 2 25/02/2021
  • 3. Jakarta, Indonesia •What is Adversary Emulation About? • Adversary Emulation vs Adversary Simulation • Phase of Security Assessment •Benefit and Importance of Adversary Emulation •Developing Adversary Emulation Plan •Getting Started with Adversary Emulation https://blueteam.id/ Agenda 3 25/02/2021
  • 4. Jakarta, Indonesia What is Adversary Emulation About? https://blueteam.id/ 4 25/02/2021
  • 5. Jakarta, Indonesia Introduction : Adversary Emulation Adversary Emulation is a type of red teaming activities which focuses on the emulation of a specific adversaries / threat actor and leverage the threat intelligence to define the behavior and TTPs that will be used in the emulation plan. https://blueteam.id/ 5 25/02/2021
  • 6. Jakarta, Indonesia Threat Informed Defense Threat-informed defense applies a deep understanding of adversary tradecraft and technology to protect against, detect, and mitigate cyber-attacks. It's a community-based approach to a worldwide challenge. More info : https://www.mitre.org/news/focal-points/threat-informed-defense https://blueteam.id/ 6 25/02/2021
  • 7. Jakarta, Indonesia Threat Informed Defense MITRE Threat Informed Defense Research Focus : • Increase the global understanding of cyber adversaries and their tradecraft by expanding upon the MITRE ATT&CK knowledge base • Advance threat-informed defense in cyber operations with open-source software, methodologies, and frameworks • Publish data sets critical to better understanding adversaries and their movements • The goal is to change the game on adversaries by relentlessly improving our collective ability to prevent, detect, and respond to cyber attacks. https://blueteam.id/ 7 25/02/2021
  • 8. Jakarta, Indonesia Adversary Emulation vs Adversary Simulation Merriam-Webster dictionary translation of emulation and simulation https://blueteam.id/ 8 25/02/2021
  • 9. Jakarta, Indonesia Adversary Emulation vs Adversary Simulation • Adversary Emulation : a process of imitate the activities or mimicking or copying the adversaries or threat actor behavior. • Adversary Simulation : a process of simulate or represent the functioning of adversaries or threat actor behavior when attacking the target. Tim MalcomVetter mentioned in his blog post (https://malcomvetter.medium.com/emulation- simulation-false-flags-b8f660734482) about this : • Emulation implies an EXACTNESS to the copy, whereas Simulation only implies SIMILARITY with some freedom to be different. I am totally agree with his opinion. https://blueteam.id/ 9 25/02/2021
  • 10. Jakarta, Indonesia Introduction : Adversary Emulation https://blueteam.id/ 10 25/02/2021 Phase of Security Assessment
  • 11. Jakarta, Indonesia Introduction : Adversary Emulation https://blueteam.id/ 11 25/02/2021 Jorge Orchilles’s Slide About Adversary Emulation (https://www.slideshare.net/jorgeorchilles/adversary-emulation-and-red-team-exercises-educause)
  • 12. Jakarta, Indonesia Introduction : Adversary Emulation • Jorge Orchilles and Scythe in their blogpost differentiate term of red teaming, adversary emuation / simulation and purple teaming in this statement : • “Adversary Emulations may be performed in a blind manner (Red Team Engagement) or non-blind (Purple Team) with the Blue Team having full knowledge of the engagement.” • Based on that statement, it can be conclude that Red Teaming and Purple Teaming is part of Adversary Emulation. It depends on the engagement, if the engagement performed without Blue Team knowing the activities, than it is called as red teaming. If the engagement involved blue team, then it is called purple teaming. https://blueteam.id/ 12 25/02/2021
  • 13. Jakarta, Indonesia Benefit and Importance of Adversary Emulation https://blueteam.id/ 13 25/02/2021
  • 14. Jakarta, Indonesia Benefit and Importance of Adversary Emulation Red Team using Adversary Emulation plan to develop an attack emulation and/or simulation and execute it against your enterprise infrastructure. These activities leverage real-world attacks and TTPs by Threat Actor, so you can identify and finding the gaps in your defense before the actual adversary attacking your infrastructure. Adversary Emulation also help security team greater visibility into their environment. Performing Adversary Emulation continuously to strengthen and tune your defense over the time. https://blueteam.id/ 14 25/02/2021
  • 15. Jakarta, Indonesia Benefit and Importance of Adversary Emulation • Adversary Emulation is just like IR and Tabletop Exercise, but in different perspective. This exercise allows your organization to test your security team against the latest threats used by real threat actor which posing the greatest risk to your organization in specific industry. • Adversary emulation giving proof of how a targeted attacker could penetrate your infrastructure and compromise sensitive assets, and/or documentation. • Adversary emulation showing that defensive capabilities succeed / failed in preventing + responding the simulated attack. It is giving you analysis of your organization’s strengths and weaknesses based on the result of the simulation. • Adversary emulation can help you not only to prioritize current existing technology capability improvement, but also also giving you a recommendation for future investments and provide recommendations for maturing your cybersecurity posture. • A focus on objective-based testing demonstrates the effectiveness of your security controls • Adversary Emulation can help you to measure your organization’s cybersecurity maturity level by evaluating it across the kill chain phases of the MITRE ATT&CK® framework or other relevant frameworks. https://blueteam.id/ 15 25/02/2021
  • 16. Jakarta, Indonesia Developing Adversary Emulation Plan https://blueteam.id/ 16 25/02/2021
  • 17. Jakarta, Indonesia Developing Adversary Emulation Plan https://blueteam.id/ 17 25/02/2021 Adam Pennington’s Slide : Leveraging MITRE ATT&CK for Detection, Analysis & Defense (https://www.slideshare.net/AdamPennington4/rhisac-summit-2019-adam-pennington-leveraging-mitre-attck-for-detection- analysis-defense)
  • 18. Jakarta, Indonesia Developing Adversary Emulation Plan I quote a paragraph from Tim MalcomVetter About Emulation Plan in Practice (https://malcomvetter.medium.com/emulation-simulation-false-flags-b8f660734482): “In practice, emulating is very hard. First, not all threat actors have publicly or privately available intelligence in the format necessary to complete all of the threat actors’ steps with the precision required to meet the definition. Second, even for those that do, certain key steps may be out of bounds, legally, for the person “replaying them” (such as compromising third party infrastructure). Third, the “programmed TTPs” were collected at a single point in time, and techniques that were used during that string of events may not be reused in the future by that threat actor, so replaying them with precision may not be that valuable of an exercise.” https://blueteam.id/ 18 25/02/2021
  • 19. Jakarta, Indonesia Developing Adversary Emulation Plan Adversary emulation plans are based on known-adversary TTPs (Tactic, Technique, and Procedure) and designed to empower red teams to emulate a specific threat actor in order to test and evaluate defensive capabilities from a threat- informed perspective. • Each emulation plan focuses on a specific named threat actor. • Each adversary emulation plan is gathered from threat intelligence reports and other artifacts that capture and describe breaches and campaigns publicly attributed to a specific named threat actor • To develop each plan, Red Team should do the research and model each threat actor, focusing not only on what they do (e.g.: gather credentials from victims) but also how (using what specific tools/utilities/commands?) and when (during what stage of a breach?) • Red Team then develop the emulation content that mimics the underlying behaviors utilized by the threat actor • To describe the details flow of emulation plan, Red Team should develop the operational flow which provides a high-level summary of the captured scenario(s). • The scenario(s) of emulation plan is broken down into step-by-step procedures provided in both human and machine- readable formats. (like .yaml in Caldera for example). Scenarios can be executed end-to-end or as individual tests. • The emulation plan scenarios will vary based on the adversary and available intelligence, but typically follow a sequential progression of how the actor breaches then works towards achieving their operational objectives within a victim environment https://blueteam.id/ 19 25/02/2021
  • 20. Jakarta, Indonesia Developing Adversary Emulation Plan For example, the MITRE The ATT&CK Evaluations of APT29 Emulation Plan (https://github.com/mitre-attack/attack- arsenal/blob/master/adversary_emulation/APT29/Emulation_Plan/APT29_EmuPla n.pdf) signaled a significant evolution to the process and established a close-to- ideal structure of components that made up the emulation plan. Those were: • Intelligence Summary: An overview of the adversary and references to cited Intelligence • Operational Flow: Chains techniques together into a logical flow of the major steps that commonly occur across the selected adversary’s operations • Emulation Plan: The TTP-by-TTP, command-by-command walkthrough to implement the adversary’s operational tradecraft as described in the Intelligence Summary and the Operational Flow https://blueteam.id/ 20 25/02/2021
  • 21. Jakarta, Indonesia Developing Adversary Emulation Plan https://blueteam.id/ 21 25/02/2021 APT3 Operational Flow https://attack.mitre.org/resources/adversary-emulation-plans/
  • 22. Jakarta, Indonesia Getting Started with The Adversary Emulation https://blueteam.id/ 22 25/02/2021
  • 23. Jakarta, Indonesia Getting Started with the Adversary Emulation When starting the Adversary Emulation Exercise, Emulation Plan is one of the most critical part. The Emulation Plan section is a specific, detailed breakdown of the tactics of the adversary group. 1. For developing the Emulation Plan, red team firstly must gather the threat intelligence document related to threat actor group that they want to emulate. 2. Red team must identify the tactics the adversary group uses for an attack, along with the particular techniques and procedures for each tactic. Mostly the TTPs defined based on MITRE ATTCK Framework as a standard. 3. To detail an emulation plan in exercise, red team must breakdown the tools that they will use to emulate the particular TTP. This information is available as part of the MITRE ATT&CK description of the adversary group, and also from Threat Intelligence Report. 4. Red Team also need to build the infrastructure as part of the emulation plan such as C2 Infrastructure, or Infrastructure for collecting sensitive data after exfiltration phase (if any) 5. Execute the emulation plan as procedure and workflow defined in the exercise. Follow up the result of the exercise. https://blueteam.id/ 23 25/02/2021
  • 24. Jakarta, Indonesia Notable Tools and Resources for Adversary EMulation Some notable tools for adversary emulation : • Caldera (MITRE) • Atomic Red Team (Red Canary) • APT Simulator • Red Team Automation (Endgame) • Infection Monkey (Guardicore) • Blue Team Toolkit (BT3) (Encripto) • AutoTTP (https://github.com/jymcheong/AutoTTP) • Purple Team ATT&CK Automation (https://github.com/praetorian-inc/purple-team-attack- automation) • ATTPwn (https://github.com/ElevenPaths/ATTPwn) • PurpleSharp (https://github.com/mvelazc0/PurpleSharp) • Prelude Operator (https://www.prelude.org/) https://blueteam.id/ 24 25/02/2021
  • 25. Jakarta, Indonesia Notable Tools and Resources for Adversary EMulation Some notable tools for developing adversary emulation : • MITRE ATT&CK Navigator • NSA Unfetter (https://nsacyber.github.io/unfetter/) • MITRE Cyber Analytical Repository (https://car.mitre.org/) • VECTR (More into for your Purple Teaming) • _YOUR THREAT INTEL REPORT_ Provider https://blueteam.id/ 25 25/02/2021
  • 26. Jakarta, Indonesia • Adversary emulation is needed by organization to fill the gaps for their current existing security assessment activity • Adversary emulation is HARD. Combining the threat intelligence and Adversary TTPs is not a simple task to do. • Threat-informed defense approach needed by every organization to get a deep understanding of adversary tradecraft and technology to protect against, detect, and mitigate cyber-attacks. • Developing Adversary Emulation Plan is a Critical part in Adversary Emulation Exercise before the Execution of scenarios defined. • Adversary Emulation showing that defensive capabilities succeed / failed in preventing + responding the simulated attack. It is giving you analysis of your organization’s strengths and weaknesses based on the result of the simulation • Adversary Emulation can help you to measure your organization’s cybersecurity maturity level by evaluating it across the kill chain phases of the MITRE ATT&CK framework or other relevant frameworks. https://blueteam.id/ TLDR ; Summary and Key Takeaway 26 25/02/2021
  • 27. Jakarta, Indonesia THANK YOU Q & A https://blueteam.id/ 27 25/02/2021