MiTRE
Mitre are resources the US-based non-profit MITRE Corporation has created for the cybersecurity community to enhance intrusion detection and prevention, threat hunting, security engineering, etc.
ATT&CK® framework
The ATT&CK® (Adversarial Tactics, Techniques, and Common Knowledge) framework is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations. The ATT&CK knowledge base is used as a foundation for the development of specific threat models and methodologies in the private sector, in government, and in the cybersecurity product and service community.
In 2013, MITRE began to address the need to record and document common TTPs (Tactics, Techniques, and Procedures) that APT (Advanced Persistent Threat) groups used against enterprise Windows networks. This started with an internal project known as FMX (Fort Meade Experiment). Within this project, selected security professionals were tasked to emulated adversarial TTPs against a network, and data was collected from the attacks on this network. The gathered data helped construct the beginning pieces of what we know today as the ATT&CK® framework.
The ATT&CK® framework has grown and expanded throughout the years. One notable expansion was that the framework focused solely on the Windows platform but has expanded to cover other platforms, such as macOS and Linux. The framework is heavily contributed to by many sources, such as security researchers and threat intelligence reports. Note this is not only a tool for blue teamers. The tool is also useful for red teamers.
The ATT&CK Matrix can be used to map a threat group to their tactics and techniques. There are several methods the search can be initiated.
ATT&CK® Matrix
Goto to the bottom of the page to view the ATT&CK® Matrix for Enterprise. Across the top of the matrix, there are 14 categories. Each category contains the techniques an adversary could use to perform the tactic. The categories cover the seven-stage Cyber Attack Lifecycle (Lockheed Martin Cyber Kill Chain).
Under Initial Access, there are 9 techniques. Some techniques have sub-techniques, such as Phishing.
Click on the gray bar to the right to view the sub-techniques.
Click on the technique or sub-technique.
CAR knowledge base
The CAR (Cyber Analytics Repository) knowledge base is “a knowledge base of analytics developed by MITRE based on the MITRE ATT&CK® adversary model. CAR defines a data model that is leveraged in its pseudocode representations but also includes implementations directly targeted at specific tools (e.g., Splunk, EQL) in its analytics. With respect to coverage, CAR is focused on providing a set of validated and well-explained analytics, in particular regarding operating theory and rationale.”
ENGAGE
“MITRE Engage is a framework for planning and discussing adversary engagement operations that empowers you to engage your adversaries and achieve your cybersecurity goals.”
MITRE Engage is considered an Adversary Engagement Approach. This is accomplished by the implementation of Cyber Denial and Cyber Deception. With Cyber Denial we prevent the adversary’s ability to conduct their operations and with Cyber Deception we intentionally plant artifacts to mislead the adversary.
The Engage website provides a starter kit to get you ‘started’ with the Adversary Engagement Approach. The starter kit is a collection of whitepapers and PDFs explaining various checklists, methodologies, and processes to get you started.
Categories
Categories based on the information on the Engage website.
Prepare the set of operational actions that will lead to your desired outcome (input)
Expose adversaries when they trigger your deployed deception activities
Affect adversaries by performing actions that will have a negative impact on their operations
Elicit information by observing the adversary and learn more about their modus operandi (TTPs)
Understand the outcomes of the operational actions (output)
D3FEND
D3FEND (Detection, Denial, and Disruption Framework Empowering Network Defence) is a knowledge graph of cybersecurity countermeasures.”
It is still in beta and is funded by the Cybersecurity Directorate of the NSA and provides information on what is the technique (definition), how the technique works (how it works), things to think about when implementing the technique (considerations), and how to use the technique (example).
As with other MITRE resources, you can filter based on the ATT&CK matrix.
ENGENUITY
Under MITRE ENGENUITY, we have:
Resources
Introducing the all-new Adversary Emulation Plan Library, ATT&CK® Emulation Plans