SlideShare a Scribd company logo
6
Most read
11
Most read
23
Most read
© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
Zeek ATT&CK Metrics
Allan Thomson CTO LookingGlass
Oct 29th 2019
2Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
Zeek Background What is it Why it matters
Data Preparation
STIX2.1
Intelligence to
ATT&CK
Mapping
Zeek Script
Programming
Data Processing
Intelligence &
ATT&CK
normalization
Zeek/Behavior
correlation
3 Things
© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
Zeek BackgroundBasic Architecture
4Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
Zeek Background
Network Analysis Framework
Focused on Network Security Monitoring
Open Source Community
20 Years Research (www.zeek.org)
5© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Public Disclosure
Zeek Ecosystem
Botnet
Scanning
Web - HTTP
Exfiltration
Email
File Sharing - SMB
Routing - RIP
Domain - DNS
Syslog
Protocol
Vulnerabilities
SSH
X509
Certificates
SSL/TLS
Certificate
Validation
Geo-location
Sandbox
Integration
Intelligence
Integration
RPC NTLM
Fast Flux
Statistics
DHCP
Connections
Blacklists
ICMP
APT
IRC
NTP
Wordpress
BittorrentSpam
IPv6
IPv4
ShellshockBitcoin
Payload
VirusTotal
Integration
MAC
Bruteforce
6© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Public Disclosure
• Zeek monitor receives copy of all traffic
• Zeek employs an event-based programming
model
• Zeek scripts run to perform analysis on the
network traffic
• Identify stateful analysis on specific network
patterns or network behavior
• Can also identify user application behaviors
(i.e. nefarious activity)
Zeek Based Detection
7Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
• Supports Actor-Framework
(https://actor-framework.org/)
• Distributed Messaging & Processing
- Event Processing
- Cross-Event Correlation
- Behavioral Identification
- Intelligence Correlation
- ATT&CK Analysis
 Multi-node
 Multi-processing
Zeek Processing and Distribution
8Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
Applying Zeek For ATT&CK/Intelligence Correlation
SOC/NOC
Passive Zeek Monitor
Perimeter
Cloud Network
Internal Network LAN
Zeek Agent
Active Zeek Detection & Mitigation
SDN Zeek Controller
Agents (Endpoints/Servers)
© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
Data PreparationIntelligence & Zeek Updates for AT T&CK
10© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Public Disclosure
• How we modelled Threat Intelligence
• How we related Intelligence to ATT&CK
• How we correlated intel with activities (net, sys, user)
• How we applied action based on Intelligence/ATT&CK
• STIX2
• STIX2
• Zeek
• Zeek
Threat Intelligence & ATT&CK
11Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
• 90 different intelligence feeds
• ~1800 Unique intelligence attack-patterns, intrusion sets, actors
- Data-driven Mapping to ATT&CK
- Include ATT&CK Mapping when producing STIX2.1 Intelligence
Data Preparation: Intel to ATT&CK Mapping
12Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
• Tactics mapped using kill-chain property on Intel Feed
- Attack-Pattern SDO
- Intrusion Set SDO
- Actor SDO
Data Preparation: Intel to ATT&CK Mapping
13Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
• Intel Feed Attack-Patterns related to ATT&CK Attack-Patterns using SROs
Data Preparation: Intel to ATT&CK Mapping
Points to ATT&CK UUID
© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
Data ProcessingCor relation, Aler ting
15Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
• Find IP ranges and CIDRs that are associated with the
NAICS Industry of ‘Carpet and Rug Mills’;
- discover all active IPs contained within these ranges,
- and
 find FQDNs associated with them where those FQDNs
have active threats
 that include
o Attack-Pattern Exploitation of Remotes Services
and
o Attack-Pattern Pass the Hash
An Intelligence Question
?
16Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
• Many different sources assert essentially the same data
- i.e. FeedA asserts that IP 10.0.0.1 has Malware A, and FeedB asserts the same
• Much of the metadata is the same across temporal series
- Repeated fact assertions and threat associations
- i.e. FeedB asserts that Actor BB, associated with Intrusion Set AA, using Attack-Pattern ZZZ Drive-by
Compromise malware YY on Infrastructure CC at time X, and again, at time Y
• Different attributes with different data representation that communicate the same
semantic information
- i.e. country_s of “United States” and “United States of America” and country_code_s of “US”, and “USA”
• Multiple different object/entity types, billions of instances that requires large-scale
join across data-sets where those data-sets are being updated in real-time
The problem answering that question?
17Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
• Entity
- Contains information about an Entity that will never change
- Metadata such as name, and IP ranges in Entities allows Facts to only contain reference
Solution: Unified Data Modelling
• Fact
• Asserts attributes on Entity
and relationships to other
Entities
• If Facts contained temporal
and source/provider
attributes, it would be
multiple Fact Record for
each
• Assertion
• Asserts one or more Facts by Source Entity and Provider Entity
• Contains all temporal attributes – Observed At, and Asserted At
18Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
Impact on Data
Bytes: ~150GB/day  ~25-30GB/day.
Records: ~150mm/day  ~19mm/day.
19Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
Zeek Intelligence Basic Lookup Pipeline
Raw Events
Zeek Intelligence
Framework Lookup
Intelligence &
ATT&CK Correlation
Intelligence Found
Event
20Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
Zeek ATT&CK Report Event Dissection
1568762713.447733 1568762713.344683 - node1 HTTP::IN_HOST_HEADER comixalex.freeiz.com Intel::DOMAIN STIX::INDICATOR
DTD All: comixalex.freeiz.com 1456283538.000000 1568776825.000000 LookingGlass Cyber Solutions :adware,:apt,:bot,:click-
fraud,:exploit-kit,:financial,:malvertising,:malware,:mobile-device,:phishing,:port-scanner,:pos-atm,:ransomware,:remote-access-
trojan,:rogue-antivirus,:rootkit,:trojan,:worm [domain-name:value = 'comixalex.freeiz.com'] C70GjJ2nFHfFRmARhg 52:54:00:06:76:f2
192.168.123.100 51072 153.92.0.100 80
Where in the network was it seen? What aspect of traffic was it detectedWhat LGC Attack Pattern ID What intel feed produced the intel?
What labels are associated?What STIXv2 Pattern was matched?What src net entity? What dst net entity?
21Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
Zeek ATT&CK Report Event Analysis
1568762713.447733 1568762713.344683 - node1 HTTP::IN_HOST_HEADER comixalex.freeiz.com Intel::DOMAIN STIX::INDICATOR
DTD All: comixalex.freeiz.com 1456283538.000000 1568776825.000000 LookingGlass Cyber Solutions :adware,:apt,:bot,:click-
fraud,:exploit-kit,:financial,:malvertising,:malware,:mobile-device,:phishing,:port-scanner,:pos-atm,:ransomware,:remote-access-
trojan,:rogue-antivirus,:rootkit,:trojan,:worm [domain-name:value = 'comixalex.freeiz.com'] C70GjJ2nFHfFRmARhg 52:54:00:06:76:f2
192.168.123.100 51072 153.92.0.100 80
Where in the network was it seen? What aspect of traffic was it detectedWhat LGC Attack Pattern ID What intel feed produced the intel?
What labels are associated?What STIXv2 Pattern was matched?What src net entity? What dst net entity?
Allows gap analysis on
coverage of networks
Allows analysis of application coverage
Allows analysis of feeds coverage/value
Allows lookup back to
ATT&CK Tactics
& Kill-Chain Phase
Allows classification analysisAllows cross correlation
with other data
Allows cross correlation
with other data
Allows pattern effectiveness
analysis
22Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved.
• Zeek provides effective and flexible framework for collection and correlation
• Data preparation & modelling can have big impact on analysis effectiveness
• Data correlation at scale requires end-to-end approach
Summary
Questions?
Thank You
L o o k i n g G l a s s C y b e r. c o m
/LookingGlassCyber/company/LookingGlass@LG_Cyber@LookingGlassCyber

More Related Content

PDF
Sharpening your Threat-Hunting Program with ATTACK Framework
PDF
Threat Hunting Procedures and Measurement Matrice
PDF
How MITRE ATT&CK helps security operations
PDF
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
PDF
Automation: The Wonderful Wizard of CTI (or is it?)
PDF
SIEM and Threat Hunting
PDF
Threat hunting 101 by Sandeep Singh
PPTX
Sharpening your Threat-Hunting Program with ATTACK Framework
Threat Hunting Procedures and Measurement Matrice
How MITRE ATT&CK helps security operations
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
Automation: The Wonderful Wizard of CTI (or is it?)
SIEM and Threat Hunting
Threat hunting 101 by Sandeep Singh

What's hot (20)

PDF
Threat Hunting with Splunk
PDF
Threat Hunting Report
PPTX
What is Threat Hunting? - Panda Security
PPTX
Effective Threat Hunting with Tactical Threat Intelligence
PPTX
Cyber kill chain
PDF
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
PPTX
Cyber Threat Hunting Workshop
PPTX
Abusing Microsoft Kerberos - Sorry you guys don't get it
PDF
Super Easy Memory Forensics
 
PPTX
Threat Hunting with Splunk Hands-on
PDF
0wn-premises: Bypassing Microsoft Defender for Identity
PPTX
Threat hunting in cyber world
PDF
PHDays 2018 Threat Hunting Hands-On Lab
PDF
Landing on Jupyter: The transformative power of data-driven storytelling for ...
PDF
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
PDF
Threat Hunting with Splunk Hands-on
PPTX
Bsides 2019 - Intelligent Threat Hunting
PPTX
QRadar, ArcSight and Splunk
PDF
State of the ATT&CK
Threat Hunting with Splunk
Threat Hunting Report
What is Threat Hunting? - Panda Security
Effective Threat Hunting with Tactical Threat Intelligence
Cyber kill chain
MITRE ATT&CKcon 2.0: Prioritizing ATT&CK Informed Defenses the CIS Way; Phili...
Cyber Threat Hunting Workshop
Abusing Microsoft Kerberos - Sorry you guys don't get it
Super Easy Memory Forensics
 
Threat Hunting with Splunk Hands-on
0wn-premises: Bypassing Microsoft Defender for Identity
Threat hunting in cyber world
PHDays 2018 Threat Hunting Hands-On Lab
Landing on Jupyter: The transformative power of data-driven storytelling for ...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Threat Hunting with Splunk Hands-on
Bsides 2019 - Intelligent Threat Hunting
QRadar, ArcSight and Splunk
State of the ATT&CK
Ad

Similar to MITRE ATT&CKcon 2.0: Zeek-based ATT&CK Metrics and Gap Analysis; Allan Thomson, LooklingGlass Cyber Solutions (20)

PDF
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
PDF
MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...
PPTX
Leveraging MITRE ATT&CK - Speaking the Common Language
PDF
Birds of a Feather: The Evolution of Threat Actor Prioritization, Gap Analysi...
PPTX
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
PDF
MITRE ATT&CK Updates: Defensive ATT&CK - Lex Crumpton
PDF
Sources of ATT&CK: A Bibliographic Journey through Enterprise ATT&CK - Robert...
PDF
MITRE ATTACKcon Power Hour - January
PPTX
ATT&CKing Threat Management
PDF
MITRE ATT&CKcon 2.0: attckr - A Toolkit for Analysis and Visualization of ATT...
PDF
ISACA -Threat Hunting using Native Windows tools .pdf
PDF
Dealing With ATT&CK's Different Levels Of Detail
PDF
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
PDF
State of ATT&CK
PDF
MITRE AttACK framework it is time you took notice_v1.0
PDF
Cyber Threat hunting workshop
PDF
MITRE-Module 4 Slides.pdf
PDF
2012-12-12 Seminar McAfee ESM
PPTX
Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...
PDF
Mitre getting-started-with-attack-october-2019
MITRE ATT&CKcon 2018: Hunters ATT&CKing with the Data, Roberto Rodriguez, Spe...
MITRE ATT&CKcon 2018: ATT&CK: All the Things, Neelsen Cyrus and David Thompso...
Leveraging MITRE ATT&CK - Speaking the Common Language
Birds of a Feather: The Evolution of Threat Actor Prioritization, Gap Analysi...
Virtual Splunk User Group - Phantom Workbook Automation & Threat Hunting with...
MITRE ATT&CK Updates: Defensive ATT&CK - Lex Crumpton
Sources of ATT&CK: A Bibliographic Journey through Enterprise ATT&CK - Robert...
MITRE ATTACKcon Power Hour - January
ATT&CKing Threat Management
MITRE ATT&CKcon 2.0: attckr - A Toolkit for Analysis and Visualization of ATT...
ISACA -Threat Hunting using Native Windows tools .pdf
Dealing With ATT&CK's Different Levels Of Detail
ATT&CKing the Sentinel – deploying a threat hunting capability on Azure Senti...
State of ATT&CK
MITRE AttACK framework it is time you took notice_v1.0
Cyber Threat hunting workshop
MITRE-Module 4 Slides.pdf
2012-12-12 Seminar McAfee ESM
Applying Provenance in APT Monitoring and Analysis Practical Challenges for S...
Mitre getting-started-with-attack-october-2019
Ad

More from MITRE - ATT&CKcon (20)

PDF
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
PDF
State of the ATTACK
PDF
ATTACK-Onomics: Attacking the Economics Behind Techniques Used by Adversaries
PDF
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
PDF
Using ATTACK to Create Cyber DBTS for Nuclear Power Plants
PDF
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
PDF
What's New with ATTACK for ICS?
PDF
From Theory to Practice: How My ATTACK Perspectives Have Changed
PDF
Putting the PRE into ATTACK
PDF
What's a MITRE with your Security?
PDF
ATTACKing the Cloud: Hopping Between the Matrices
PDF
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
PDF
Transforming Adversary Emulation Into a Data Analysis Question
PDF
TA505: A Study of High End Big Game Hunting in 2020
PDF
What's New with ATTACK for Cloud?
PDF
Starting Over with Sub-Techniques
PDF
MITRE ATTACKCon Power Hour - December
PDF
MITRE ATT&CKcon Power Hour - November
PDF
MITRE ATTACKcon Power Hour - October
PDF
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
State of the ATTACK
ATTACK-Onomics: Attacking the Economics Behind Techniques Used by Adversaries
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
Using ATTACK to Create Cyber DBTS for Nuclear Power Plants
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
What's New with ATTACK for ICS?
From Theory to Practice: How My ATTACK Perspectives Have Changed
Putting the PRE into ATTACK
What's a MITRE with your Security?
ATTACKing the Cloud: Hopping Between the Matrices
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
Transforming Adversary Emulation Into a Data Analysis Question
TA505: A Study of High End Big Game Hunting in 2020
What's New with ATTACK for Cloud?
Starting Over with Sub-Techniques
MITRE ATTACKCon Power Hour - December
MITRE ATT&CKcon Power Hour - November
MITRE ATTACKcon Power Hour - October
MITRE ATT&CKcon 2.0: Flashback with ATT&CK: Exploring Malware History with AT...

Recently uploaded (20)

PDF
Modernizing your data center with Dell and AMD
PDF
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
NewMind AI Monthly Chronicles - July 2025
PDF
Approach and Philosophy of On baking technology
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPT
Teaching material agriculture food technology
PDF
Encapsulation_ Review paper, used for researhc scholars
PDF
Advanced methodologies resolving dimensionality complications for autism neur...
PDF
The Rise and Fall of 3GPP – Time for a Sabbatical?
PDF
Building Integrated photovoltaic BIPV_UPV.pdf
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Network Security Unit 5.pdf for BCA BBA.
PPT
“AI and Expert System Decision Support & Business Intelligence Systems”
PDF
Unlocking AI with Model Context Protocol (MCP)
PDF
Mobile App Security Testing_ A Comprehensive Guide.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
CIFDAQ's Market Insight: SEC Turns Pro Crypto
Modernizing your data center with Dell and AMD
How UI/UX Design Impacts User Retention in Mobile Apps.pdf
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Reach Out and Touch Someone: Haptics and Empathic Computing
NewMind AI Monthly Chronicles - July 2025
Approach and Philosophy of On baking technology
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Teaching material agriculture food technology
Encapsulation_ Review paper, used for researhc scholars
Advanced methodologies resolving dimensionality complications for autism neur...
The Rise and Fall of 3GPP – Time for a Sabbatical?
Building Integrated photovoltaic BIPV_UPV.pdf
Per capita expenditure prediction using model stacking based on satellite ima...
Network Security Unit 5.pdf for BCA BBA.
“AI and Expert System Decision Support & Business Intelligence Systems”
Unlocking AI with Model Context Protocol (MCP)
Mobile App Security Testing_ A Comprehensive Guide.pdf
Understanding_Digital_Forensics_Presentation.pptx
CIFDAQ's Market Insight: SEC Turns Pro Crypto

MITRE ATT&CKcon 2.0: Zeek-based ATT&CK Metrics and Gap Analysis; Allan Thomson, LooklingGlass Cyber Solutions

  • 1. © 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Zeek ATT&CK Metrics Allan Thomson CTO LookingGlass Oct 29th 2019
  • 2. 2Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Zeek Background What is it Why it matters Data Preparation STIX2.1 Intelligence to ATT&CK Mapping Zeek Script Programming Data Processing Intelligence & ATT&CK normalization Zeek/Behavior correlation 3 Things
  • 3. © 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Zeek BackgroundBasic Architecture
  • 4. 4Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Zeek Background Network Analysis Framework Focused on Network Security Monitoring Open Source Community 20 Years Research (www.zeek.org)
  • 5. 5© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Public Disclosure Zeek Ecosystem Botnet Scanning Web - HTTP Exfiltration Email File Sharing - SMB Routing - RIP Domain - DNS Syslog Protocol Vulnerabilities SSH X509 Certificates SSL/TLS Certificate Validation Geo-location Sandbox Integration Intelligence Integration RPC NTLM Fast Flux Statistics DHCP Connections Blacklists ICMP APT IRC NTP Wordpress BittorrentSpam IPv6 IPv4 ShellshockBitcoin Payload VirusTotal Integration MAC Bruteforce
  • 6. 6© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Public Disclosure • Zeek monitor receives copy of all traffic • Zeek employs an event-based programming model • Zeek scripts run to perform analysis on the network traffic • Identify stateful analysis on specific network patterns or network behavior • Can also identify user application behaviors (i.e. nefarious activity) Zeek Based Detection
  • 7. 7Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. • Supports Actor-Framework (https://actor-framework.org/) • Distributed Messaging & Processing - Event Processing - Cross-Event Correlation - Behavioral Identification - Intelligence Correlation - ATT&CK Analysis  Multi-node  Multi-processing Zeek Processing and Distribution
  • 8. 8Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Applying Zeek For ATT&CK/Intelligence Correlation SOC/NOC Passive Zeek Monitor Perimeter Cloud Network Internal Network LAN Zeek Agent Active Zeek Detection & Mitigation SDN Zeek Controller Agents (Endpoints/Servers)
  • 9. © 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Data PreparationIntelligence & Zeek Updates for AT T&CK
  • 10. 10© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Public Disclosure • How we modelled Threat Intelligence • How we related Intelligence to ATT&CK • How we correlated intel with activities (net, sys, user) • How we applied action based on Intelligence/ATT&CK • STIX2 • STIX2 • Zeek • Zeek Threat Intelligence & ATT&CK
  • 11. 11Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. • 90 different intelligence feeds • ~1800 Unique intelligence attack-patterns, intrusion sets, actors - Data-driven Mapping to ATT&CK - Include ATT&CK Mapping when producing STIX2.1 Intelligence Data Preparation: Intel to ATT&CK Mapping
  • 12. 12Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. • Tactics mapped using kill-chain property on Intel Feed - Attack-Pattern SDO - Intrusion Set SDO - Actor SDO Data Preparation: Intel to ATT&CK Mapping
  • 13. 13Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. • Intel Feed Attack-Patterns related to ATT&CK Attack-Patterns using SROs Data Preparation: Intel to ATT&CK Mapping Points to ATT&CK UUID
  • 14. © 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Data ProcessingCor relation, Aler ting
  • 15. 15Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. • Find IP ranges and CIDRs that are associated with the NAICS Industry of ‘Carpet and Rug Mills’; - discover all active IPs contained within these ranges, - and  find FQDNs associated with them where those FQDNs have active threats  that include o Attack-Pattern Exploitation of Remotes Services and o Attack-Pattern Pass the Hash An Intelligence Question ?
  • 16. 16Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. • Many different sources assert essentially the same data - i.e. FeedA asserts that IP 10.0.0.1 has Malware A, and FeedB asserts the same • Much of the metadata is the same across temporal series - Repeated fact assertions and threat associations - i.e. FeedB asserts that Actor BB, associated with Intrusion Set AA, using Attack-Pattern ZZZ Drive-by Compromise malware YY on Infrastructure CC at time X, and again, at time Y • Different attributes with different data representation that communicate the same semantic information - i.e. country_s of “United States” and “United States of America” and country_code_s of “US”, and “USA” • Multiple different object/entity types, billions of instances that requires large-scale join across data-sets where those data-sets are being updated in real-time The problem answering that question?
  • 17. 17Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. • Entity - Contains information about an Entity that will never change - Metadata such as name, and IP ranges in Entities allows Facts to only contain reference Solution: Unified Data Modelling • Fact • Asserts attributes on Entity and relationships to other Entities • If Facts contained temporal and source/provider attributes, it would be multiple Fact Record for each • Assertion • Asserts one or more Facts by Source Entity and Provider Entity • Contains all temporal attributes – Observed At, and Asserted At
  • 18. 18Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Impact on Data Bytes: ~150GB/day  ~25-30GB/day. Records: ~150mm/day  ~19mm/day.
  • 19. 19Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Zeek Intelligence Basic Lookup Pipeline Raw Events Zeek Intelligence Framework Lookup Intelligence & ATT&CK Correlation Intelligence Found Event
  • 20. 20Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Zeek ATT&CK Report Event Dissection 1568762713.447733 1568762713.344683 - node1 HTTP::IN_HOST_HEADER comixalex.freeiz.com Intel::DOMAIN STIX::INDICATOR DTD All: comixalex.freeiz.com 1456283538.000000 1568776825.000000 LookingGlass Cyber Solutions :adware,:apt,:bot,:click- fraud,:exploit-kit,:financial,:malvertising,:malware,:mobile-device,:phishing,:port-scanner,:pos-atm,:ransomware,:remote-access- trojan,:rogue-antivirus,:rootkit,:trojan,:worm [domain-name:value = 'comixalex.freeiz.com'] C70GjJ2nFHfFRmARhg 52:54:00:06:76:f2 192.168.123.100 51072 153.92.0.100 80 Where in the network was it seen? What aspect of traffic was it detectedWhat LGC Attack Pattern ID What intel feed produced the intel? What labels are associated?What STIXv2 Pattern was matched?What src net entity? What dst net entity?
  • 21. 21Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. Zeek ATT&CK Report Event Analysis 1568762713.447733 1568762713.344683 - node1 HTTP::IN_HOST_HEADER comixalex.freeiz.com Intel::DOMAIN STIX::INDICATOR DTD All: comixalex.freeiz.com 1456283538.000000 1568776825.000000 LookingGlass Cyber Solutions :adware,:apt,:bot,:click- fraud,:exploit-kit,:financial,:malvertising,:malware,:mobile-device,:phishing,:port-scanner,:pos-atm,:ransomware,:remote-access- trojan,:rogue-antivirus,:rootkit,:trojan,:worm [domain-name:value = 'comixalex.freeiz.com'] C70GjJ2nFHfFRmARhg 52:54:00:06:76:f2 192.168.123.100 51072 153.92.0.100 80 Where in the network was it seen? What aspect of traffic was it detectedWhat LGC Attack Pattern ID What intel feed produced the intel? What labels are associated?What STIXv2 Pattern was matched?What src net entity? What dst net entity? Allows gap analysis on coverage of networks Allows analysis of application coverage Allows analysis of feeds coverage/value Allows lookup back to ATT&CK Tactics & Kill-Chain Phase Allows classification analysisAllows cross correlation with other data Allows cross correlation with other data Allows pattern effectiveness analysis
  • 22. 22Public Disclosure© 2019 LookingGlass Cyber Solutions, Inc. All Rights Reserved. • Zeek provides effective and flexible framework for collection and correlation • Data preparation & modelling can have big impact on analysis effectiveness • Data correlation at scale requires end-to-end approach Summary Questions?
  • 23. Thank You L o o k i n g G l a s s C y b e r. c o m /LookingGlassCyber/company/LookingGlass@LG_Cyber@LookingGlassCyber