SlideShare a Scribd company logo
From Automation to Analytics
Simulating the Adversary to Create Better Detections
MITRE ATT&CKcon
23-24OCT18
Dave Herrald and Ryan
Kovar @Splunk
Dave
Ryan
Disclaimer
During the course of this presentation, we may make forward looking statements
regarding future events or the expected performance of the company. I often lie.
Maybe this is a lie. Wik Alsø wik Alsø alsø wik Wi nøt trei a høliday in Sweden this
yër? See the løveli lakes The wøndërful telephøne system And mäni interesting furry
animals The characters and incidents portrayed and the names used in this
Presentation are fictitious and any similarity to the names, characters, or history of
any person is entirely accidental and unintentional. Signed RICHARD M. NIXON
Including the majestik møøse A Møøse once bit my Marcus... No realli! He was
Karving his initials on the møøse with the sharpened end of an interspace
tøøthbrush given him by Svenge – his brother-in-law – a Canadian dentist and star
of many Norwegian møvies: "The Høt Hands of an Canadian Dentist", "Fillings of
Passion", "The Huge Mølars of Horst Nordfink"... In addition, any information about
our roadmap outlines our general product direction and is subject to change at
any time without notice. Splunk undertakës no øbligation either to develøp the
features or functionality described or to include any such feature or functionality in
a future release.
- 25+ years IT and security
- Information security
officer, security architect,
pen tester, consultant, SE,
system/network engineer
- Former SANS Mentor
- Co-creator of Splunk Boss
of the SOC
Staff Security Strategist
@daveherrald
# whoami > Dave Herrald
CISSP, GIAC G*, GSE #79
• 19 years of cyber security experience
• Worked in US/UK Public Sector and DOD most recently
in nation state hunting roles
• Enjoys clicking too fast, long walks in the woods, and
data visualization
• Current role on Security Practice team focuses on
incident/breach response, threat intelligence, and
research
• Currently interested in automating methods to triage
data collection for IR analyst review.
• Also investigating why printers are so insubordinate
ಠ_ಠ
• Co-creator of Splunk Boss of the SOC
4
Principal Security Strategist
Minster of the OODAloopers
@meansec
# whoami > Ryan Kovar
CISSP, MSc(Dist)
We use Splunk (and
Phantom)
But you don’t have to!
Agenda
•Faking it till you make it (APT Style)
•A brief review of some new simulation tooling
•Simulating a realistic adversary with automation
•Developing New Detection Analytics
•Free stuff
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary to Create Better Detections, David Herrald and Ryan Kovar, Splunk
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary to Create Better Detections, David Herrald and Ryan Kovar, Splunk
If you’ve never been a red
teamer…
… Sit Down
If you’ve never automated your
red teaming…
… Sit Down
If you’ve never been a fake
nationstate APT group…
… Sit Down
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary to Create Better Detections, David Herrald and Ryan Kovar, Splunk
I should build a fake
APT… but I should
keep it real.
Place Holder PowerSploit Capabilities
14
Place Holder PowerSploit Capabilities
15
16
17
Not just a ”Flag” but personas and
infrastructure
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary to Create Better Detections, David Herrald and Ryan Kovar, Splunk
• Nation state sponsored adversary
• Located (+8.0 time zone)
• Uses Korean encoded language
• Uses Hancom Thinkfree Office
• European VPS servers
• Western innovative Brewers and
Home Brewing companies
• PowerShell Empire
• Spear phishing
• Seeking to obtain high end
Western Beers for production in
their breweries
• Documents with .hwp
suffix
• PS exec lateral movement
• YMLP
• Self signed
SSL/TLS certificates
• +8.0 hour time zone
• Korean fonts for English
• Korean text google
translated to English
• Naenara user agent string
A special thanks to
TAEDONGGANG STOUT
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary to Create Better Detections, David Herrald and Ryan Kovar, Splunk
TAEDONGGANG Techniques
TAEDONGGANG Techniques
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary to Create Better Detections, David Herrald and Ryan Kovar, Splunk
The Tools
Tool makers
Kyle Champlain
Product Manager
Splunk
@Dishwishy
Tim Frazier
Senior Sales Engineer
Splunk Phantom
@timfrazier1
Builders…
Kyle Champlain
Product Manager
Splunk
@Dishwishy
Tim Frazier
Senior Sales Engineer
Splunk Phantom
@timfrazier1
Builders…
Kyle Champlain
Product Manager
Splunk
@Dishwishy
Tim Frazier
Senior Sales Engineer
Splunk Phantom
@timfrazier1
Slides and Video
https://conf.splunk.com/conf-online.html?search=1244#/
TL;DR
Splunk
Simulation Runner
Phantom
Adversary Simulation Playbook
Executes Atomic Red Team detection tests
Windows OSX Linux
Splunk UF Splunk UF Splunk UF
ATT&CK
Navigator
Splunk Security Analytics
Atomic Red Team App
Implements ATR in Phantom
ES CONTENT
UPDATE
TL;DR
Splunk
Simulation Runner
Phantom
Adversary Simulation Playbook
Executes Atomic Red Team detection tests
Windows OSX Linux
Splunk UF Splunk UF Splunk UF
ATT&CK
Navigator
Splunk Security Analytics
Atomic Red Team App
Implements ATR in Phantom
ES CONTENT
UPDATE
Use this Tooling to Develop New Detections
Splunk
Simulation Runner
Phantom
Adversary Simulation Playbook
Executes Atomic Red Team detection tests
Windows OSX Linux
Splunk UF Splunk UF Splunk UF
ATT&CK
Navigator
Atomic Red Team App
Implements ATR in Phantom
Analytic
Development
Thank You to Atomic Red Team
https://www.redcanary.com/atomic-red-team
Casey Smith
@subTee
ATT&CK Navigator in Splunk
Kick off a simulation
Kick off simulation.
Start and End Events
Signs of Test Execution
Finally Write the Analytic
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary to Create Better Detections, David Herrald and Ryan Kovar, Splunk
Just one
more
thing…
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary to Create Better Detections, David Herrald and Ryan Kovar, Splunk
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary to Create Better Detections, David Herrald and Ryan Kovar, Splunk
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary to Create Better Detections, David Herrald and Ryan Kovar, Splunk
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary to Create Better Detections, David Herrald and Ryan Kovar, Splunk
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary to Create Better Detections, David Herrald and Ryan Kovar, Splunk
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary to Create Better Detections, David Herrald and Ryan Kovar, Splunk
• Nation-state sponsored adversary
• Located (+8.0 timezone)
• Compromised AWS EC2 instances
• Compromised Chinese hosts
• Western innovative Brewers
and Home Brewing companies
• Vulnerability scanning
• Amplification DoS attacks
• Crypto-coin mining
• Fondness for causing chaos
and disruption.
• Generates revenue via coin
mining on compromised hosts
• Aliases:
• 6HOUL@G3R
• CRYP70KOL5CH
• Known public Coinhive site key:
• swUaVm1xhugv49RmyEMucajPO8VPAUlS
A special thanks to
TAEDONGGANG LAGER
MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary to Create Better Detections, David Herrald and Ryan Kovar, Splunk
Takeaways •Adversary simulation is
helpful for security analytic
development
•Tooling is increasingly
available
•Purple Team can be
realized
•We still haven’t solved cyber
•Cloud :’(
Free Tools
Splunk
Simulation Runner
Phantom
Adversary Simulation Playbook
Executes Atomic Red Team detection tests
Windows OSX Linux
Splunk UF Splunk UF Splunk UF
ATT&CK
Navigator
Splunk Security Analytics
Atomic Red Team App
Implements ATR in Phantom
ES CONTENT
UPDATE
▶ MITRE ATT&CK Navigator in a Splunk Dashboard
https://github.com/daveherrald/SA-attck_nav
▶ Simulation Runner App for Splunk
https://github.com/daveherrald/SA-advsim
▶ Adversary Simulation Playbook for Phantom
https://github.com/daveherrald/AdvSim
▶ Atomic Red Team App for Phantom
https://github.com/daveherrald/ART_Phantom
https://conf.splunk.com/conf-online.html?search=1244#/
Dave Herrald
@daveherrald
Ryan Kovar
@meansec
Contact info

More Related Content

PDF
Knowledge for the masses: Storytelling with ATT&CK
PPTX
Purple Teaming with ATT&CK - x33fcon 2018
PDF
Purple Team Exercise Framework Workshop #PTEF
PDF
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
PPTX
MITRE ATT&CK framework
PDF
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
PDF
Adversary Emulation and Red Team Exercises - EDUCAUSE
PDF
MITRE ATT&CKcon 2018: From Red VS Blue to Red ♥ Blue, Olaf Hartong and Vincen...
Knowledge for the masses: Storytelling with ATT&CK
Purple Teaming with ATT&CK - x33fcon 2018
Purple Team Exercise Framework Workshop #PTEF
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
MITRE ATT&CK framework
MITRE ATT&CKcon 2.0: Using Threat Intelligence to Focus ATT&CK Activities; Da...
Adversary Emulation and Red Team Exercises - EDUCAUSE
MITRE ATT&CKcon 2018: From Red VS Blue to Red ♥ Blue, Olaf Hartong and Vincen...

What's hot (20)

PDF
Transforming Adversary Emulation Into a Data Analysis Question
PDF
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
PDF
Adversary Emulation - Red Team Village - Mayhem 2020
PDF
Threat-Based Adversary Emulation with MITRE ATT&CK
PPTX
PowerShell for Practical Purple Teaming
PDF
Purple Team Exercise Hands-On Workshop #GrayHat
PDF
Purple Team Use Case - Security Weekly
PPTX
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
PDF
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
PDF
State of the ATTACK
PDF
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
PDF
Automation: The Wonderful Wizard of CTI (or is it?)
PDF
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
PDF
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
PDF
Mapping ATT&CK Techniques to ENGAGE Activities
PDF
ATT&CK Updates- Defensive ATT&CK
PDF
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
PDF
Automating the mundanity of technique IDs with ATT&CK Detections Collector
PDF
Threat Hunting
PPTX
ATT&CKing with Threat Intelligence
Transforming Adversary Emulation Into a Data Analysis Question
Intelligence Failures of Lincolns Top Spies: What CTI Analysts Can Learn Fro...
Adversary Emulation - Red Team Village - Mayhem 2020
Threat-Based Adversary Emulation with MITRE ATT&CK
PowerShell for Practical Purple Teaming
Purple Team Exercise Hands-On Workshop #GrayHat
Purple Team Use Case - Security Weekly
Purple Team - Work it out: Organizing Effective Adversary Emulation Exercises
FIRST CTI Symposium: Turning intelligence into action with MITRE ATT&CK™
State of the ATTACK
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
Automation: The Wonderful Wizard of CTI (or is it?)
Upgrade Your SOC with Cortex XSOAR & Elastic SIEM
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Mapping ATT&CK Techniques to ENGAGE Activities
ATT&CK Updates- Defensive ATT&CK
ATT&CKing Your Adversaries - Operationalizing cyber intelligence in your own ...
Automating the mundanity of technique IDs with ATT&CK Detections Collector
Threat Hunting
ATT&CKing with Threat Intelligence
Ad

Similar to MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary to Create Better Detections, David Herrald and Ryan Kovar, Splunk (20)

PDF
Threat Intelligence Victory Garden
PPTX
10(?) holiday gifts for the SOC who has everything
PPTX
SplunkLive! Stockholm 2019 - Customer presentation: Norlys
PDF
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
PPTX
SplunkLive! Stockholm 2017 - Norsk Tipping Customer Presentation
PPTX
Better Threat Analytics: From Getting Started to Cloud Security Analytics and...
PPTX
SOCs for the rest of us
PDF
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
PDF
Ug soar 22sep21
PDF
External Threat Hunters are Red Teamers
PPTX
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
PPTX
Using Big Data for Cybersecurity
PPTX
Splunk for Security Breakout Session
PDF
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
PDF
Mission possible splunk+paloaltonetworks_6_2015
PPTX
SplunkLive! Nashville Texas Roadhouse
PPTX
Adversary Emulation and the C2 Matrix
PPTX
Threat Hunting
PPTX
Danfoss - Splunk for Vulnerability Management
PPTX
SplunkLive! - Splunk for Security
Threat Intelligence Victory Garden
10(?) holiday gifts for the SOC who has everything
SplunkLive! Stockholm 2019 - Customer presentation: Norlys
SEC1671/ Attack range/Splunk SIEMulator splunkconf2019
SplunkLive! Stockholm 2017 - Norsk Tipping Customer Presentation
Better Threat Analytics: From Getting Started to Cloud Security Analytics and...
SOCs for the rest of us
Using Splunk to Defend Against Advanced Threats - Webinar Slides: November 2017
Ug soar 22sep21
External Threat Hunters are Red Teamers
Partner Exec Summit 2018 - Frankfurt: Analytics-driven Security und SOAR
Using Big Data for Cybersecurity
Splunk for Security Breakout Session
Mission Possible: Detect and Prevent CyberAttacks with Splunk and Palo Alto N...
Mission possible splunk+paloaltonetworks_6_2015
SplunkLive! Nashville Texas Roadhouse
Adversary Emulation and the C2 Matrix
Threat Hunting
Danfoss - Splunk for Vulnerability Management
SplunkLive! - Splunk for Security
Ad

More from MITRE - ATT&CKcon (20)

PDF
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
PDF
ATTACK-Onomics: Attacking the Economics Behind Techniques Used by Adversaries
PDF
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
PDF
MITRE ATTACKcon Power Hour - January
PDF
Using ATTACK to Create Cyber DBTS for Nuclear Power Plants
PDF
Sharpening your Threat-Hunting Program with ATTACK Framework
PDF
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
PDF
What's New with ATTACK for ICS?
PDF
From Theory to Practice: How My ATTACK Perspectives Have Changed
PDF
Putting the PRE into ATTACK
PDF
What's a MITRE with your Security?
PDF
ATTACKing the Cloud: Hopping Between the Matrices
PDF
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
PDF
TA505: A Study of High End Big Game Hunting in 2020
PDF
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
PDF
What's New with ATTACK for Cloud?
PDF
Starting Over with Sub-Techniques
PDF
MITRE ATTACKCon Power Hour - December
PDF
MITRE ATT&CKcon Power Hour - November
PDF
MITRE ATTACKcon Power Hour - October
ATTACKers Think in Graphs: Building Graphs for Threat Intelligence
ATTACK-Onomics: Attacking the Economics Behind Techniques Used by Adversaries
Measure What Matters: How to Use MITRE ATTACK to do the Right Things in the R...
MITRE ATTACKcon Power Hour - January
Using ATTACK to Create Cyber DBTS for Nuclear Power Plants
Sharpening your Threat-Hunting Program with ATTACK Framework
Helping Small Companies Leverage CTI with an Open Source Threat Mapping
What's New with ATTACK for ICS?
From Theory to Practice: How My ATTACK Perspectives Have Changed
Putting the PRE into ATTACK
What's a MITRE with your Security?
ATTACKing the Cloud: Hopping Between the Matrices
Mapping the EventBot Mobile Banking Trojan with MITRE ATTACK for Mobile
TA505: A Study of High End Big Game Hunting in 2020
Using MITRE PRE-ATTACK and ATTACK in Cybercrime Education and Research
What's New with ATTACK for Cloud?
Starting Over with Sub-Techniques
MITRE ATTACKCon Power Hour - December
MITRE ATT&CKcon Power Hour - November
MITRE ATTACKcon Power Hour - October

Recently uploaded (20)

PDF
Chapter 3 Spatial Domain Image Processing.pdf
PPTX
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
PPTX
20250228 LYD VKU AI Blended-Learning.pptx
PDF
Machine learning based COVID-19 study performance prediction
PDF
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
PDF
Spectral efficient network and resource selection model in 5G networks
PDF
Reach Out and Touch Someone: Haptics and Empathic Computing
PDF
Empathic Computing: Creating Shared Understanding
PDF
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
PDF
Diabetes mellitus diagnosis method based random forest with bat algorithm
PDF
Agricultural_Statistics_at_a_Glance_2022_0.pdf
PPTX
Understanding_Digital_Forensics_Presentation.pptx
PDF
Per capita expenditure prediction using model stacking based on satellite ima...
PDF
Dropbox Q2 2025 Financial Results & Investor Presentation
PPTX
sap open course for s4hana steps from ECC to s4
PDF
Approach and Philosophy of On baking technology
PPTX
Programs and apps: productivity, graphics, security and other tools
PPTX
Spectroscopy.pptx food analysis technology
PPTX
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
PDF
NewMind AI Weekly Chronicles - August'25 Week I
Chapter 3 Spatial Domain Image Processing.pdf
VMware vSphere Foundation How to Sell Presentation-Ver1.4-2-14-2024.pptx
20250228 LYD VKU AI Blended-Learning.pptx
Machine learning based COVID-19 study performance prediction
7 ChatGPT Prompts to Help You Define Your Ideal Customer Profile.pdf
Spectral efficient network and resource selection model in 5G networks
Reach Out and Touch Someone: Haptics and Empathic Computing
Empathic Computing: Creating Shared Understanding
Optimiser vos workloads AI/ML sur Amazon EC2 et AWS Graviton
Diabetes mellitus diagnosis method based random forest with bat algorithm
Agricultural_Statistics_at_a_Glance_2022_0.pdf
Understanding_Digital_Forensics_Presentation.pptx
Per capita expenditure prediction using model stacking based on satellite ima...
Dropbox Q2 2025 Financial Results & Investor Presentation
sap open course for s4hana steps from ECC to s4
Approach and Philosophy of On baking technology
Programs and apps: productivity, graphics, security and other tools
Spectroscopy.pptx food analysis technology
KOM of Painting work and Equipment Insulation REV00 update 25-dec.pptx
NewMind AI Weekly Chronicles - August'25 Week I

MITRE ATT&CKcon 2018: From Automation to Analytics: Simulating the Adversary to Create Better Detections, David Herrald and Ryan Kovar, Splunk

  • 1. From Automation to Analytics Simulating the Adversary to Create Better Detections MITRE ATT&CKcon 23-24OCT18 Dave Herrald and Ryan Kovar @Splunk Dave Ryan
  • 2. Disclaimer During the course of this presentation, we may make forward looking statements regarding future events or the expected performance of the company. I often lie. Maybe this is a lie. Wik Alsø wik Alsø alsø wik Wi nøt trei a høliday in Sweden this yër? See the løveli lakes The wøndërful telephøne system And mäni interesting furry animals The characters and incidents portrayed and the names used in this Presentation are fictitious and any similarity to the names, characters, or history of any person is entirely accidental and unintentional. Signed RICHARD M. NIXON Including the majestik møøse A Møøse once bit my Marcus... No realli! He was Karving his initials on the møøse with the sharpened end of an interspace tøøthbrush given him by Svenge – his brother-in-law – a Canadian dentist and star of many Norwegian møvies: "The Høt Hands of an Canadian Dentist", "Fillings of Passion", "The Huge Mølars of Horst Nordfink"... In addition, any information about our roadmap outlines our general product direction and is subject to change at any time without notice. Splunk undertakës no øbligation either to develøp the features or functionality described or to include any such feature or functionality in a future release.
  • 3. - 25+ years IT and security - Information security officer, security architect, pen tester, consultant, SE, system/network engineer - Former SANS Mentor - Co-creator of Splunk Boss of the SOC Staff Security Strategist @daveherrald # whoami > Dave Herrald CISSP, GIAC G*, GSE #79
  • 4. • 19 years of cyber security experience • Worked in US/UK Public Sector and DOD most recently in nation state hunting roles • Enjoys clicking too fast, long walks in the woods, and data visualization • Current role on Security Practice team focuses on incident/breach response, threat intelligence, and research • Currently interested in automating methods to triage data collection for IR analyst review. • Also investigating why printers are so insubordinate ಠ_ಠ • Co-creator of Splunk Boss of the SOC 4 Principal Security Strategist Minster of the OODAloopers @meansec # whoami > Ryan Kovar CISSP, MSc(Dist)
  • 5. We use Splunk (and Phantom) But you don’t have to!
  • 6. Agenda •Faking it till you make it (APT Style) •A brief review of some new simulation tooling •Simulating a realistic adversary with automation •Developing New Detection Analytics •Free stuff
  • 9. If you’ve never been a red teamer… … Sit Down
  • 10. If you’ve never automated your red teaming… … Sit Down
  • 11. If you’ve never been a fake nationstate APT group… … Sit Down
  • 13. I should build a fake APT… but I should keep it real.
  • 14. Place Holder PowerSploit Capabilities 14
  • 15. Place Holder PowerSploit Capabilities 15
  • 16. 16
  • 17. 17 Not just a ”Flag” but personas and infrastructure
  • 19. • Nation state sponsored adversary • Located (+8.0 time zone) • Uses Korean encoded language • Uses Hancom Thinkfree Office • European VPS servers • Western innovative Brewers and Home Brewing companies • PowerShell Empire • Spear phishing • Seeking to obtain high end Western Beers for production in their breweries • Documents with .hwp suffix • PS exec lateral movement • YMLP • Self signed SSL/TLS certificates • +8.0 hour time zone • Korean fonts for English • Korean text google translated to English • Naenara user agent string A special thanks to TAEDONGGANG STOUT
  • 25. Tool makers Kyle Champlain Product Manager Splunk @Dishwishy Tim Frazier Senior Sales Engineer Splunk Phantom @timfrazier1
  • 26. Builders… Kyle Champlain Product Manager Splunk @Dishwishy Tim Frazier Senior Sales Engineer Splunk Phantom @timfrazier1
  • 27. Builders… Kyle Champlain Product Manager Splunk @Dishwishy Tim Frazier Senior Sales Engineer Splunk Phantom @timfrazier1 Slides and Video https://conf.splunk.com/conf-online.html?search=1244#/
  • 28. TL;DR Splunk Simulation Runner Phantom Adversary Simulation Playbook Executes Atomic Red Team detection tests Windows OSX Linux Splunk UF Splunk UF Splunk UF ATT&CK Navigator Splunk Security Analytics Atomic Red Team App Implements ATR in Phantom ES CONTENT UPDATE
  • 29. TL;DR Splunk Simulation Runner Phantom Adversary Simulation Playbook Executes Atomic Red Team detection tests Windows OSX Linux Splunk UF Splunk UF Splunk UF ATT&CK Navigator Splunk Security Analytics Atomic Red Team App Implements ATR in Phantom ES CONTENT UPDATE
  • 30. Use this Tooling to Develop New Detections Splunk Simulation Runner Phantom Adversary Simulation Playbook Executes Atomic Red Team detection tests Windows OSX Linux Splunk UF Splunk UF Splunk UF ATT&CK Navigator Atomic Red Team App Implements ATR in Phantom Analytic Development
  • 31. Thank You to Atomic Red Team https://www.redcanary.com/atomic-red-team Casey Smith @subTee
  • 33. Kick off a simulation Kick off simulation.
  • 34. Start and End Events
  • 35. Signs of Test Execution
  • 36. Finally Write the Analytic
  • 45. • Nation-state sponsored adversary • Located (+8.0 timezone) • Compromised AWS EC2 instances • Compromised Chinese hosts • Western innovative Brewers and Home Brewing companies • Vulnerability scanning • Amplification DoS attacks • Crypto-coin mining • Fondness for causing chaos and disruption. • Generates revenue via coin mining on compromised hosts • Aliases: • 6HOUL@G3R • CRYP70KOL5CH • Known public Coinhive site key: • swUaVm1xhugv49RmyEMucajPO8VPAUlS A special thanks to TAEDONGGANG LAGER
  • 47. Takeaways •Adversary simulation is helpful for security analytic development •Tooling is increasingly available •Purple Team can be realized •We still haven’t solved cyber •Cloud :’(
  • 48. Free Tools Splunk Simulation Runner Phantom Adversary Simulation Playbook Executes Atomic Red Team detection tests Windows OSX Linux Splunk UF Splunk UF Splunk UF ATT&CK Navigator Splunk Security Analytics Atomic Red Team App Implements ATR in Phantom ES CONTENT UPDATE ▶ MITRE ATT&CK Navigator in a Splunk Dashboard https://github.com/daveherrald/SA-attck_nav ▶ Simulation Runner App for Splunk https://github.com/daveherrald/SA-advsim ▶ Adversary Simulation Playbook for Phantom https://github.com/daveherrald/AdvSim ▶ Atomic Red Team App for Phantom https://github.com/daveherrald/ART_Phantom https://conf.splunk.com/conf-online.html?search=1244#/