The MITRE ATT&CK Framework is an organised knowledgebase of cybercriminals' tactics, techniques and behaviour patterns that can be used by threat detection teams to look for malicious activity in an enterprise environment*. The framework, created by the US-based MITRE Corporation, facilitates post-compromise threat detection based on attackers' behaviour and interaction with target systems, rather than standard IoCs like hashes, domains, IP addresses, etc. It can be leveraged both by adversary emulation teams (or red teams) to plan attack simulations, and by detection teams (or blue teams) to verify if the rules set up in detection tools are generating alerts as intended.
*MITRE maintains a separate a set of tactics for mobile devices, but the enterprise version is better known and more widely used.
Before going into the ATT&CK Framework itself, we briefly describe the two threat detection methods commonly used today, and how they relate to the Framework. MITRE ATT&CK is focused on behaviour-based detection, as already mentioned, and modern detection tools use a combination of both signature-based and behaviour-based detection.
Signature-based detection uses known Indicators of Compromise (IoCs) and signatures associated with files, IP addresses and domains known to be malicious to find threats. These IoCs (like blacklisted file hashes, subject lines, byte sequences, malicious IP addresses, domain names, etc.) are usually drawn from threat intel feeds and fed into intrusion detection, antivirus and other tools so they can throw alerts when malicious activity or an infected file is detected. While signature-based detection is an efficient, consistent and time-tested way to find known threats, it is not enough on its own to find the fast-evolving and advanced threats that organisations face today.
The reason traditional signature-based detection methods don't always work is because attackers are constantly evolving their tactics and use a variety of obfuscation techniques to evade detection. Signature-based detection methods cannot catch threats that exploit new, unknown vulnerabilities not yet picked up by threat intel feeds, or ones that masquerade behind legitimate apps and live off the land, in addition to other advanced persistent threats (APTs).
This is where behaviour-based detection can help. Security professionals over the years have observed that attackers tend to "exhibit consistent patterns of behavior while interacting with endpoint or victim systems". Setting up systems to detect these behaviours can help organisations find advanced, unknown threats that evade signature-based detection.
To apply behavioural analytics to threat detection, security teams start by baselining the normal behaviours of systems and users. This usually involves employing machine learning to observe and define how a system is expected to behave in the normal course and setting up detection rules to throw alerts when deviations from this baseline (signs of malicious activity) are observed.
The ATT&CK Framework was created to make this process easier for security teams by giving them access to an easy-to-understand resource detailing attacker tactics and techniques that they could draw on.
The ATT&CK Framework is made up of attacker Tactics, Techniques, and Procedures (TTPs).
Tactics are the highest-level category in the knowledgebase and denote the underlying goals behind specific adversary actions. Initial Access - TA0001, for instance, includes all the ways in which an attacker can gain access to a target network. Other tactics routinely used by attackers during the threat lifecycle are Execution - TA0002, Persistence- TA0003, Privilege Escalation - TA0004, Defense Evasion - TA0005, Lateral Movement - TA0008, Collection - TA0009, Exfiltration - TA 0010, and Command and Control - TA 0011.
ATT&CK covers a total of 14 tactics as of today, but because the framework continues to evolve, this number may change as new tactics become important and are added to the list.
Techniques are the methods used by attackers to attain specific goals. There are multiple techniques listed under each tactic. For example, the popular techniques covered under the Initial Access tactic are Phishing, External Remote Services, Supply Chain Compromise, Drive-by Compromise, and Exploit Public-Facing Application.
Procedures include examples of how techniques are implemented by threat actors in the real world. The section contains important information about adversary group operations and the specific techniques used and preferred by different groups. Threat hunting teams can use procedures to delve deeper into attack execution specifics, accurately design attack simulations, and finetune detection.
While a detailed description of threat hunting and detection based on the MITRE ATT&CK Framework is beyond the scope of this article, and is covered extensively by MITRE here, we touch upon ATT&CK-based hunting very briefly in the following section. The framework is used extensively by threat hunting teams to look for post-compromise threats in enterprise environments.
Because there are too many threats that could possibly exist in an organisation's IT environment, hunting teams need to decide what to look for first. They need to pick from a multitude of possible attack scenarios. This can be done by asking the right questions -
Teams that are just starting out can plan hunts based on adversary groups. They can choose a group based on who they've previously targeted, look at their TTPs more closely, and share this information with defenders.
Hunting teams operating at a more advanced level can use data collected from past incidents and events and map this information to ATT&CK. This may include "incident response data, reports from OSINT or threat intel subscriptions, real-time alerts, and (the) organization’s historic information".
Security teams can set up automated monitoring rules for the specific threats they zero in on based on the assessment/prioritization exercise. These rules can then be tested by the adversary emulation and detection teams by executing a technique as an attacker would, and then checking to see if the SIEM tool or other detection tools are throwing alerts and responding as expected.
The MITRE ATT&CK Framework is an excellent resource for cyberdefence teams and can be used in a variety of creative ways.
In future posts, we will be covering the individual tactics included in the ATT&CK Framework in greater detail, along with examples of how we, at LinearStack, leverage the framework for threat detection and hunting.
We provide a wide range of cyber security services to businesses in New Zealand and Australia, with threat hunting based on ATT&CK techniques forming a critical part of our Extended Managed Detection and Response (XMDR) service. Read more about the service here.
Get in touch with us to book a free consultation.