SlideShare a Scribd company logo
1 of 43
Download to read offline
Tidying up your Nest
Validating ATT&CK Technique Coverage
Using EDR Telemetry
Presenters
Jesse Brown
Senior Detection Validation
Engineer
@jessecbrown
Adam Ostrich
Senior Detection Validation
Engineer
Detection Validation Team
Understand how things should work
Make sure things work like they should
Make things work better
Outline
What is EDR telemetry?
How Red Canary works
Validation of ATT&CK techniques
Automated validation workflow
Lessons learned
Outline
What is EDR telemetry?
How Red Canary works
Validation of ATT&CK techniques
Automated validation workflow
Lessons learned
What is EDR Telemetry?
Cost of collection
(Time, CPU/memory/bandwidth)
Depth
of
coverage
EDR
Telemetry
Forensic
Images
Good for hunting
System
Logs
Telemetry Types
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
Remote PS
Telemetry Types
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
Network connection
Remote PS
wsmprovhost.exe
process
Telemetry Types
File system
procdump.exe
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
powershell.exe
process
Script load
Process start
procdump.exe
process
Network connection
Remote PS
wsmprovhost.exe
process
Telemetry Types
File system
procdump.exe
kernel32.dll
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
powershell.exe
process
Script load
Process start
Module load
procdump.exe
process
Network connection
Remote PS
wsmprovhost.exe
process
Telemetry Types
File system
procdump.exe
kernel32.dll
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
powershell.exe
process
Script load
Process start
Module load
Windows Registry
EULA registry key
procdump.exe
process
Registry
modification
Network connection
Remote PS
wsmprovhost.exe
process
Telemetry Types
File system
lsass.exe
process
procdump.exe
kernel32.dll
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
powershell.exe
process
Script load
Process start
Module load
Crossproc
Windows Registry
EULA registry key
procdump.exe
process
Registry
modification
Network connection
Remote PS
wsmprovhost.exe
process
Telemetry Types
File system
lsass.exe
process
procdump.exe
kernel32.dll
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
lsass.dmp
powershell.exe
process
Script load
Process start
Module load
Crossproc
File create
Windows Registry
EULA registry key
procdump.exe
process
Registry
modification
Network connection
Remote PS
wsmprovhost.exe
process
Telemetry Types
File system
lsass.exe
process
procdump.exe
kernel32.dll
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
lsass.dmp
powershell.exe
process
Script load
Process start
Module load
Crossproc
File create
Windows Registry
EULA registry key
procdump.exe
process
APIs
Registry
modification
Network connection
Remote PS
wsmprovhost.exe
process
Telemetry Types
File system
lsass.exe
process
procdump.exe
kernel32.dll
PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp"
lsass.dmp
powershell.exe
process
Script load
Process start
Module load
Crossproc
File create
Windows Registry
EULA registry key
procdump.exe
process
APIs
File open
Registry
modification
Network connection
Remote PS
wsmprovhost.exe
process
It’s JSON!
{
"event_type": "process_start",
"process_command_line": "procdump -ma lsass.exe lsass.dmp",
"process_md5": "f2091c44d89789f689d98bc244358878",
"process_name": "procdump.exe",
"process_path": "C:Sysinternalsprocdump.exe",
"process_pid": 1528,
}
Outline
What is EDR telemetry?
How Red Canary works
Validation of ATT&CK techniques
Automated validation workflow
Lessons learned
How Red Canary works (and maybe you too?)
{
"Event.type": "ProcessStart",
"Process.cmdline": "procdump -ma lsass.exe lsass.dmp",
"Process.md5": "f2091c44d89789f689d98bc244358878",
"Process.name": "procdump.exe",
"Process.path": "C:Sysinternalsprocdump.exe",
"Process.pid": 1528,
}
{
"event_type": "process_start",
"process_command_line": "procdump -ma lsass.exe lsass.dmp",
"process_md5": "f2091c44d89789f689d98bc244358878",
"process_name": "procdump.exe",
"process_path": "C:Sysinternalsprocdump.exe",
"process_pid": 1528,
}
Standardization
Native Standardized
Outline
What is EDR telemetry?
How Red Canary works
Validation of ATT&CK techniques
Automated validation workflow
Lessons learned
Validate coverage across ATT&CK techniques
Break techniques down to data components
Data component Detects
Process creation procdump -ma lsass.exe lsass.dmp
Command execution Invoke-Mimikatz
Process access API calls to OpenProcess/MiniDumpWriteDump
Process access Crossproc (e.g. open process handle)
File modification File lsass.dmp written to disk
OS Credential Dumping: LSASS Memory (T1003.001)
ATT&CK Technique Coverage by Data Component
Enterprise Techniques
So many combinations.. Oh my!
End-to-end functional testing!
Run functional test
Report expected results
Compare expected results to actual results
Analyze/detect changes in results
Outline
What is EDR telemetry?
How Red Canary works
Validation of ATT&CK techniques
Automated validation workflow
Lessons learned
Scaling Validation with Automation
1) Spin up infrastructure
2) Run tests
3) Analyze results
Architecture
1) Spin up infrastructure
Coalmine
Spin up infrastructure
○ Terraform and ansible
○ Creates/configures EC2 instances
Run tests
○ Atomic Red Team
https://github.com/redcanaryco/ansible-atomic-red-team
○ Atomic Test Harnesses
https://atomicredteam.io/atomic-test-harnesses
○ Vuvuzela
Architecture
2) Run tests
Vuvuzela (OS) data
"event_type": "process_start"
"process_command_line": "procdump -ma lsass.exe lsass.dmp"
"process_md5": "f2091c44d89789f689d98bc244358878"
"process_name": "procdump.exe"
"process_path": "C:Sysinternalsprocdump.exe"
"process_pid": 1528
Test VM
EDR sensor data
"event_type": "process_start"
"process_command_line": "procdump -ma lsass.exe lsass.dmp"
"process_md5": "f2091c44d89789f689d98bc244358878"
"process_name": "procdump.exe"
"process_path": "DeviceHarddiskVolume1Sysinternalsprocdump.exe"
"process_pid": 1529
Vuvuzela: Black box testing
procdump test
Vuvuzela
EDR sensor
Test execution
Observation
Observation Reported data
Reported data
Mismatch
Expected Results Report
Test sensor/endpoint to identify sensor data
Expected detection analytics
Expected standardized telemetry
Architecture
3) Analyze results
Telemetry Validation Lambda Function
Identify relevant engine data
Telemetry Profiling
Compare expected results
to engine data
Report results to S3 Splunk
API
Telemetry Validation Lambda Function
Identify relevant engine data
Telemetry Profiling
Compare expected results
to engine data
Report results to S3 Splunk
API
Telemetry Validation Lambda Function
Identify relevant engine data
Telemetry Profiling
Compare expected results
to engine data
Report results to S3 Splunk
API
Telemetry Validation Lambda Function
Identify relevant engine data
Telemetry Profiling
Compare expected results
to engine data
Report results to S3 Splunk
API
Valid
Skipped
Invalid
Splunk dashboard example
Field name Expected Found
process_command_lin
e
procdump -ma lsass.exe lsass.dmp procdump -ma lsass.exe lsass.dmp
process_md5 f2091c44d89789f689d98bc244358878 f2091c44d89789f689d98bc244358878
process_name procdump.exe procdump.exe
Field name Expected Found
process_sha1 db1ef4ce56820c93a3b7f1fdf36d3fffc7d1ec96
process_sha256 e4ea34a7c2b51982a6c42c6367119f34bec9aeb9a60937836540035583a5b3bc
Field name Expected Found
process_path C:Sysinternalsprocdump.exe DeviceHarddiskVolume1Sysinternalsprocdump.exe
process_pid 1528 1529
Validation APIs
Validation APIs
Outline
What is EDR telemetry?
How Red Canary works
Validation of ATT&CK techniques
Automated validation workflow
Lessons learned
Telemetry quirks
Signal/noise ratio different for each sensor
○ Lower quality telemetry (i.e. filemods & regmods) can be highly filtered
○ Filemod filtering by process, directory, and file type
File telemetry has inconsistent meaning/terminology
○ What is a filemod?
○ Creation vs. modification
Challenges of using EDR telemetry
Level of detail is limited
○ Limited insight into certain types of behaviors like API calls
○ Can’t use static binary signatures outside of a hash
○ Certain telemetry types are limited because they’re noisy
Example: Credential theft
○ Dumping lsass -> good telemetry
○ Application credential theft (e.g. browsers) -> limited/no telemetry
○ EDR sensors are good at generating alerts for this activity
Benefits of using EDR telemetry
Offloading detections from endpoints
○ Avoids limitations of analytics on endpoints
○ Highly scalable
○ Adversary can’t see alerts
Versatile representation of behavior
○ Captures context
○ Useful for correlation
Key takeaways
EDR telemetry balances signal/noise
Validating ATT&CK techniques using data components scales well
End-to-end functional testing
○ Provides a clear signal when there’s a problem
○ Captures nuances of techniques
Automation allows us to scale validation
Con: EDR telemetry provides a limited level of detail
Pro: EDR telemetry offloads detections from endpoints and
provides context around an alert
Questions?
Team blog series: The Validated Canary
Our validation philosophy
https://redcanary.com/blog/detection-validation/
Unearthing changes in our detection engine with Coalmine
https://redcanary.com/blog/coalmine/

More Related Content

What's hot

Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developersThreat Modelling - It's not just for developers
Threat Modelling - It's not just for developersMITRE ATT&CK
 
CISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity AdvisoriesCISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity AdvisoriesMITRE ATT&CK
 
Projects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the CenterProjects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the CenterMITRE ATT&CK
 
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...MITRE ATT&CK
 
ATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open SourceATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open SourceMITRE ATT&CK
 
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...MITRE ATT&CK
 
Knowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CKKnowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CKMITRE ATT&CK
 
MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK
 
It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...MITRE ATT&CK
 
Mapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE ActivitiesMapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE ActivitiesMITRE ATT&CK
 
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...MITRE ATT&CK
 
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)MITRE ATT&CK
 
Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...
Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...
Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...MITRE ATT&CK
 
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK MappingEvaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK MappingMITRE ATT&CK
 
ATT&CK Updates- Defensive ATT&CK
ATT&CK Updates- Defensive ATT&CKATT&CK Updates- Defensive ATT&CK
ATT&CK Updates- Defensive ATT&CKMITRE ATT&CK
 
ATT&CKING Containers in The Cloud
ATT&CKING Containers in The CloudATT&CKING Containers in The Cloud
ATT&CKING Containers in The CloudMITRE ATT&CK
 
ATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue DivideATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue DivideMITRE ATT&CK
 
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red TeamWhat is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red TeamMITRE ATT&CK
 
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKTracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKMITRE ATT&CK
 

What's hot (20)

Threat Modelling - It's not just for developers
Threat Modelling - It's not just for developersThreat Modelling - It's not just for developers
Threat Modelling - It's not just for developers
 
CISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity AdvisoriesCISA usage of ATT&CK in Cybersecurity Advisories
CISA usage of ATT&CK in Cybersecurity Advisories
 
Projects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the CenterProjects to Impact- Operationalizing Work from the Center
Projects to Impact- Operationalizing Work from the Center
 
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
ATT&CK is the Best Defense - Emulating Sophisticated Adversary Malware to Bol...
 
ATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open SourceATT&CK Updates- ATT&CK's Open Source
ATT&CK Updates- ATT&CK's Open Source
 
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
Driving Intelligence with MITRE ATT&CK: Leveraging Limited Resources to Build...
 
Knowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CKKnowledge for the masses: Storytelling with ATT&CK
Knowledge for the masses: Storytelling with ATT&CK
 
MITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICSMITRE ATT&CK Updates: ICS
MITRE ATT&CK Updates: ICS
 
It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...It's just a jump to the left (of boom): Prioritizing detection implementation...
It's just a jump to the left (of boom): Prioritizing detection implementation...
 
Mapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE ActivitiesMapping ATT&CK Techniques to ENGAGE Activities
Mapping ATT&CK Techniques to ENGAGE Activities
 
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
Mapping to MITRE ATT&CK: Enhancing Operations Through the Tracking of Interac...
 
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
MITRE ATT&CK Updates: State of the ATT&CK (ATT&CKcon 4.0 Edition)
 
Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...
Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...
Exploring how Students Map Social Engineering Techniques to the ATT&CK Framew...
 
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK MappingEvaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
Evaluating and Enhancing Security Maturity through MITRE ATT&CK Mapping
 
ATT&CK Updates- Defensive ATT&CK
ATT&CK Updates- Defensive ATT&CKATT&CK Updates- Defensive ATT&CK
ATT&CK Updates- Defensive ATT&CK
 
ATT&CKING Containers in The Cloud
ATT&CKING Containers in The CloudATT&CKING Containers in The Cloud
ATT&CKING Containers in The Cloud
 
ATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue DivideATT&CKing the Red/Blue Divide
ATT&CKing the Red/Blue Divide
 
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red TeamWhat is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
What is ATT&CK coverage, anyway? Breadth and depth analysis with Atomic Red Team
 
ATT&CKcon Intro
ATT&CKcon IntroATT&CKcon Intro
ATT&CKcon Intro
 
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CKTracking Noisy Behavior and Risk-Based Alerting with ATT&CK
Tracking Noisy Behavior and Risk-Based Alerting with ATT&CK
 

Similar to Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry

The Hunter Games: How to Find the Adversary with Event Query Language
The Hunter Games: How to Find the Adversary with Event Query LanguageThe Hunter Games: How to Find the Adversary with Event Query Language
The Hunter Games: How to Find the Adversary with Event Query LanguageRoss Wolf
 
Dynamic Tracing of your AMP web site
Dynamic Tracing of your AMP web siteDynamic Tracing of your AMP web site
Dynamic Tracing of your AMP web siteSriram Natarajan
 
MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...
MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...
MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...MITRE - ATT&CKcon
 
Puppet Camp DC 2015: Distributed OpenSCAP Compliance Validation with MCollective
Puppet Camp DC 2015: Distributed OpenSCAP Compliance Validation with MCollectivePuppet Camp DC 2015: Distributed OpenSCAP Compliance Validation with MCollective
Puppet Camp DC 2015: Distributed OpenSCAP Compliance Validation with MCollectivePuppet
 
Uvm presentation dac2011_final
Uvm presentation dac2011_finalUvm presentation dac2011_final
Uvm presentation dac2011_finalsean chen
 
101 run commands
101 run commands101 run commands
101 run commandsSunil Patel
 
Presentation iv implementasi 802x eap tls peap mscha pv2
Presentation iv implementasi  802x eap tls peap mscha pv2Presentation iv implementasi  802x eap tls peap mscha pv2
Presentation iv implementasi 802x eap tls peap mscha pv2Hell19
 
HKG18-TR14 - Postmortem Debugging with Coresight
HKG18-TR14 - Postmortem Debugging with CoresightHKG18-TR14 - Postmortem Debugging with Coresight
HKG18-TR14 - Postmortem Debugging with CoresightLinaro
 
Building an Automated Behavioral Malware Analysis Environment using Free and ...
Building an Automated Behavioral Malware Analysis Environment using Free and ...Building an Automated Behavioral Malware Analysis Environment using Free and ...
Building an Automated Behavioral Malware Analysis Environment using Free and ...Jim Clausing
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemCyber Security Alliance
 
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...Amazon Web Services
 
Антон Наумович, Система автоматической крэш-аналитики своими средствами
Антон Наумович, Система автоматической крэш-аналитики своими средствамиАнтон Наумович, Система автоматической крэш-аналитики своими средствами
Антон Наумович, Система автоматической крэш-аналитики своими средствамиSergey Platonov
 
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak   CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak PROIDEA
 
Sql Automation 20090610
Sql Automation 20090610Sql Automation 20090610
Sql Automation 20090610livingco
 
Why and How Powershell will rule the Command Line - Barcamp LA 4
Why and How Powershell will rule the Command Line - Barcamp LA 4Why and How Powershell will rule the Command Line - Barcamp LA 4
Why and How Powershell will rule the Command Line - Barcamp LA 4Ilya Haykinson
 
100 comment win xp
100 comment win xp100 comment win xp
100 comment win xpNie Andini
 
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...Paula Januszkiewicz
 
[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법
[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법
[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법GangSeok Lee
 
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows T.Rob Wyatt
 

Similar to Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry (20)

The Hunter Games: How to Find the Adversary with Event Query Language
The Hunter Games: How to Find the Adversary with Event Query LanguageThe Hunter Games: How to Find the Adversary with Event Query Language
The Hunter Games: How to Find the Adversary with Event Query Language
 
Dynamic Tracing of your AMP web site
Dynamic Tracing of your AMP web siteDynamic Tracing of your AMP web site
Dynamic Tracing of your AMP web site
 
MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...
MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...
MITRE ATT&CKcon 2018: From Technique to Detection, Paul Ewing and Ross Wolf, ...
 
Puppet Camp DC 2015: Distributed OpenSCAP Compliance Validation with MCollective
Puppet Camp DC 2015: Distributed OpenSCAP Compliance Validation with MCollectivePuppet Camp DC 2015: Distributed OpenSCAP Compliance Validation with MCollective
Puppet Camp DC 2015: Distributed OpenSCAP Compliance Validation with MCollective
 
Uvm presentation dac2011_final
Uvm presentation dac2011_finalUvm presentation dac2011_final
Uvm presentation dac2011_final
 
101 run commands
101 run commands101 run commands
101 run commands
 
Presentation iv implementasi 802x eap tls peap mscha pv2
Presentation iv implementasi  802x eap tls peap mscha pv2Presentation iv implementasi  802x eap tls peap mscha pv2
Presentation iv implementasi 802x eap tls peap mscha pv2
 
HKG18-TR14 - Postmortem Debugging with Coresight
HKG18-TR14 - Postmortem Debugging with CoresightHKG18-TR14 - Postmortem Debugging with Coresight
HKG18-TR14 - Postmortem Debugging with Coresight
 
Building an Automated Behavioral Malware Analysis Environment using Free and ...
Building an Automated Behavioral Malware Analysis Environment using Free and ...Building an Automated Behavioral Malware Analysis Environment using Free and ...
Building an Automated Behavioral Malware Analysis Environment using Free and ...
 
Reverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande ModemReverse engineering Swisscom's Centro Grande Modem
Reverse engineering Swisscom's Centro Grande Modem
 
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...
Monitoring as Code: Getting to Monitoring-Driven Development - DEV314 - re:In...
 
Антон Наумович, Система автоматической крэш-аналитики своими средствами
Антон Наумович, Система автоматической крэш-аналитики своими средствамиАнтон Наумович, Система автоматической крэш-аналитики своими средствами
Антон Наумович, Система автоматической крэш-аналитики своими средствами
 
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak   CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
CONFidence 2015: DTrace + OSX = Fun - Andrzej Dyjak
 
Security War Games
Security War GamesSecurity War Games
Security War Games
 
Sql Automation 20090610
Sql Automation 20090610Sql Automation 20090610
Sql Automation 20090610
 
Why and How Powershell will rule the Command Line - Barcamp LA 4
Why and How Powershell will rule the Command Line - Barcamp LA 4Why and How Powershell will rule the Command Line - Barcamp LA 4
Why and How Powershell will rule the Command Line - Barcamp LA 4
 
100 comment win xp
100 comment win xp100 comment win xp
100 comment win xp
 
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
RSA 2018: Adventures in the Underland: Techniques against Hackers Evading the...
 
[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법
[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법
[2009 CodeEngn Conference 03] koheung - 윈도우 커널 악성코드에 대한 분석 및 방법
 
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
WMQ Toolbox: 20 Scripts, One-liners, & Utilities for UNIX & Windows
 

More from MITRE ATT&CK

Dealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailDealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailMITRE ATT&CK
 
Automating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard ArchitectureAutomating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard ArchitectureMITRE ATT&CK
 
I can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CKI can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CKMITRE ATT&CK
 
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)MITRE ATT&CK
 
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...MITRE ATT&CK
 
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSExploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSMITRE ATT&CK
 
MITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the CloudMITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the CloudMITRE ATT&CK
 
Using ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real dataUsing ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real dataMITRE ATT&CK
 
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...MITRE ATT&CK
 
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...MITRE ATT&CK
 
The case for quishing
The case for quishingThe case for quishing
The case for quishingMITRE ATT&CK
 
Discussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataDiscussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataMITRE ATT&CK
 
The art of communicating ATT&CK to the CFO
The art of communicating ATT&CK to the CFOThe art of communicating ATT&CK to the CFO
The art of communicating ATT&CK to the CFOMITRE ATT&CK
 
Cloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK MatrixCloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK MatrixMITRE ATT&CK
 
MITRE ATT&CK Updates: Software
MITRE ATT&CK Updates: SoftwareMITRE ATT&CK Updates: Software
MITRE ATT&CK Updates: SoftwareMITRE ATT&CK
 
Or Lenses and Layers: Adding Business Context to Enterprise Mappings
Or Lenses and Layers: Adding Business Context to Enterprise MappingsOr Lenses and Layers: Adding Business Context to Enterprise Mappings
Or Lenses and Layers: Adding Business Context to Enterprise MappingsMITRE ATT&CK
 
Adjectives for ATT&CK
Adjectives for ATT&CKAdjectives for ATT&CK
Adjectives for ATT&CKMITRE ATT&CK
 

More from MITRE ATT&CK (17)

Dealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of DetailDealing With ATT&CK's Different Levels Of Detail
Dealing With ATT&CK's Different Levels Of Detail
 
Automating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard ArchitectureAutomating testing by implementing ATT&CK using the Blackboard Architecture
Automating testing by implementing ATT&CK using the Blackboard Architecture
 
I can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CKI can haz cake: Benefits of working with MITRE on ATT&CK
I can haz cake: Benefits of working with MITRE on ATT&CK
 
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
ATT&CK’s Adoption in CTI: A Great Success (with Room to Grow!)
 
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
Civil Society, Pegasus, and Predator: What Sophisticated Spyware Means For Us...
 
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOSExploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
Exploring the Labyrinth: Deep dive into the Lazarus Group's foray into macOS
 
MITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the CloudMITRE ATT&CK Updates: State of the Cloud
MITRE ATT&CK Updates: State of the Cloud
 
Using ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real dataUsing ATT&CK to created wicked actors in real data
Using ATT&CK to created wicked actors in real data
 
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
MITRE ATT&CK Updates: New Ideas in Enterprise - Pushing the boundaries of ATT...
 
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
Navigating the Attention Economy – Using MITRE ATT&CK to Communicate to Stake...
 
The case for quishing
The case for quishingThe case for quishing
The case for quishing
 
Discussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber DataDiscussion on Finding Relationships in Cyber Data
Discussion on Finding Relationships in Cyber Data
 
The art of communicating ATT&CK to the CFO
The art of communicating ATT&CK to the CFOThe art of communicating ATT&CK to the CFO
The art of communicating ATT&CK to the CFO
 
Cloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK MatrixCloud Native Workload ATT&CK Matrix
Cloud Native Workload ATT&CK Matrix
 
MITRE ATT&CK Updates: Software
MITRE ATT&CK Updates: SoftwareMITRE ATT&CK Updates: Software
MITRE ATT&CK Updates: Software
 
Or Lenses and Layers: Adding Business Context to Enterprise Mappings
Or Lenses and Layers: Adding Business Context to Enterprise MappingsOr Lenses and Layers: Adding Business Context to Enterprise Mappings
Or Lenses and Layers: Adding Business Context to Enterprise Mappings
 
Adjectives for ATT&CK
Adjectives for ATT&CKAdjectives for ATT&CK
Adjectives for ATT&CK
 

Recently uploaded

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024Lorenzo Miniero
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr LapshynFwdays
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clashcharlottematthew16
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Wonjun Hwang
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machinePadma Pradeep
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxhariprasad279825
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupFlorian Wilhelm
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitecturePixlogix Infotech
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr BaganFwdays
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationSlibray Presentation
 

Recently uploaded (20)

SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024SIP trunking in Janus @ Kamailio World 2024
SIP trunking in Janus @ Kamailio World 2024
 
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
"Federated learning: out of reach no matter how close",Oleksandr Lapshyn
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Powerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time ClashPowerpoint exploring the locations used in television show Time Clash
Powerpoint exploring the locations used in television show Time Clash
 
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
Bun (KitWorks Team Study 노별마루 발표 2024.4.22)
 
Install Stable Diffusion in windows machine
Install Stable Diffusion in windows machineInstall Stable Diffusion in windows machine
Install Stable Diffusion in windows machine
 
Artificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptxArtificial intelligence in cctv survelliance.pptx
Artificial intelligence in cctv survelliance.pptx
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
Streamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project SetupStreamlining Python Development: A Guide to a Modern Project Setup
Streamlining Python Development: A Guide to a Modern Project Setup
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Understanding the Laravel MVC Architecture
Understanding the Laravel MVC ArchitectureUnderstanding the Laravel MVC Architecture
Understanding the Laravel MVC Architecture
 
"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan"ML in Production",Oleksandr Bagan
"ML in Production",Oleksandr Bagan
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Connect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck PresentationConnect Wave/ connectwave Pitch Deck Presentation
Connect Wave/ connectwave Pitch Deck Presentation
 

Tidying up your Nest: Validating ATT&CK Technique Coverage using EDR Telemetry

  • 1. Tidying up your Nest Validating ATT&CK Technique Coverage Using EDR Telemetry
  • 2. Presenters Jesse Brown Senior Detection Validation Engineer @jessecbrown Adam Ostrich Senior Detection Validation Engineer Detection Validation Team Understand how things should work Make sure things work like they should Make things work better
  • 3. Outline What is EDR telemetry? How Red Canary works Validation of ATT&CK techniques Automated validation workflow Lessons learned
  • 4. Outline What is EDR telemetry? How Red Canary works Validation of ATT&CK techniques Automated validation workflow Lessons learned
  • 5. What is EDR Telemetry? Cost of collection (Time, CPU/memory/bandwidth) Depth of coverage EDR Telemetry Forensic Images Good for hunting System Logs
  • 6. Telemetry Types PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" Remote PS
  • 7. Telemetry Types PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" Network connection Remote PS wsmprovhost.exe process
  • 8. Telemetry Types File system procdump.exe PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" powershell.exe process Script load Process start procdump.exe process Network connection Remote PS wsmprovhost.exe process
  • 9. Telemetry Types File system procdump.exe kernel32.dll PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" powershell.exe process Script load Process start Module load procdump.exe process Network connection Remote PS wsmprovhost.exe process
  • 10. Telemetry Types File system procdump.exe kernel32.dll PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" powershell.exe process Script load Process start Module load Windows Registry EULA registry key procdump.exe process Registry modification Network connection Remote PS wsmprovhost.exe process
  • 11. Telemetry Types File system lsass.exe process procdump.exe kernel32.dll PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" powershell.exe process Script load Process start Module load Crossproc Windows Registry EULA registry key procdump.exe process Registry modification Network connection Remote PS wsmprovhost.exe process
  • 12. Telemetry Types File system lsass.exe process procdump.exe kernel32.dll PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" lsass.dmp powershell.exe process Script load Process start Module load Crossproc File create Windows Registry EULA registry key procdump.exe process Registry modification Network connection Remote PS wsmprovhost.exe process
  • 13. Telemetry Types File system lsass.exe process procdump.exe kernel32.dll PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" lsass.dmp powershell.exe process Script load Process start Module load Crossproc File create Windows Registry EULA registry key procdump.exe process APIs Registry modification Network connection Remote PS wsmprovhost.exe process
  • 14. Telemetry Types File system lsass.exe process procdump.exe kernel32.dll PS > Invoke-Expression -Command "procdump -ma lsass.exe lsass.dmp" lsass.dmp powershell.exe process Script load Process start Module load Crossproc File create Windows Registry EULA registry key procdump.exe process APIs File open Registry modification Network connection Remote PS wsmprovhost.exe process
  • 15. It’s JSON! { "event_type": "process_start", "process_command_line": "procdump -ma lsass.exe lsass.dmp", "process_md5": "f2091c44d89789f689d98bc244358878", "process_name": "procdump.exe", "process_path": "C:Sysinternalsprocdump.exe", "process_pid": 1528, }
  • 16. Outline What is EDR telemetry? How Red Canary works Validation of ATT&CK techniques Automated validation workflow Lessons learned
  • 17. How Red Canary works (and maybe you too?)
  • 18. { "Event.type": "ProcessStart", "Process.cmdline": "procdump -ma lsass.exe lsass.dmp", "Process.md5": "f2091c44d89789f689d98bc244358878", "Process.name": "procdump.exe", "Process.path": "C:Sysinternalsprocdump.exe", "Process.pid": 1528, } { "event_type": "process_start", "process_command_line": "procdump -ma lsass.exe lsass.dmp", "process_md5": "f2091c44d89789f689d98bc244358878", "process_name": "procdump.exe", "process_path": "C:Sysinternalsprocdump.exe", "process_pid": 1528, } Standardization Native Standardized
  • 19. Outline What is EDR telemetry? How Red Canary works Validation of ATT&CK techniques Automated validation workflow Lessons learned
  • 20. Validate coverage across ATT&CK techniques Break techniques down to data components Data component Detects Process creation procdump -ma lsass.exe lsass.dmp Command execution Invoke-Mimikatz Process access API calls to OpenProcess/MiniDumpWriteDump Process access Crossproc (e.g. open process handle) File modification File lsass.dmp written to disk OS Credential Dumping: LSASS Memory (T1003.001)
  • 21. ATT&CK Technique Coverage by Data Component Enterprise Techniques
  • 23. End-to-end functional testing! Run functional test Report expected results Compare expected results to actual results Analyze/detect changes in results
  • 24. Outline What is EDR telemetry? How Red Canary works Validation of ATT&CK techniques Automated validation workflow Lessons learned
  • 25. Scaling Validation with Automation 1) Spin up infrastructure 2) Run tests 3) Analyze results
  • 26. Architecture 1) Spin up infrastructure
  • 27. Coalmine Spin up infrastructure ○ Terraform and ansible ○ Creates/configures EC2 instances Run tests ○ Atomic Red Team https://github.com/redcanaryco/ansible-atomic-red-team ○ Atomic Test Harnesses https://atomicredteam.io/atomic-test-harnesses ○ Vuvuzela
  • 29. Vuvuzela (OS) data "event_type": "process_start" "process_command_line": "procdump -ma lsass.exe lsass.dmp" "process_md5": "f2091c44d89789f689d98bc244358878" "process_name": "procdump.exe" "process_path": "C:Sysinternalsprocdump.exe" "process_pid": 1528 Test VM EDR sensor data "event_type": "process_start" "process_command_line": "procdump -ma lsass.exe lsass.dmp" "process_md5": "f2091c44d89789f689d98bc244358878" "process_name": "procdump.exe" "process_path": "DeviceHarddiskVolume1Sysinternalsprocdump.exe" "process_pid": 1529 Vuvuzela: Black box testing procdump test Vuvuzela EDR sensor Test execution Observation Observation Reported data Reported data Mismatch
  • 30. Expected Results Report Test sensor/endpoint to identify sensor data Expected detection analytics Expected standardized telemetry
  • 32. Telemetry Validation Lambda Function Identify relevant engine data Telemetry Profiling Compare expected results to engine data Report results to S3 Splunk API
  • 33. Telemetry Validation Lambda Function Identify relevant engine data Telemetry Profiling Compare expected results to engine data Report results to S3 Splunk API
  • 34. Telemetry Validation Lambda Function Identify relevant engine data Telemetry Profiling Compare expected results to engine data Report results to S3 Splunk API
  • 35. Telemetry Validation Lambda Function Identify relevant engine data Telemetry Profiling Compare expected results to engine data Report results to S3 Splunk API
  • 36. Valid Skipped Invalid Splunk dashboard example Field name Expected Found process_command_lin e procdump -ma lsass.exe lsass.dmp procdump -ma lsass.exe lsass.dmp process_md5 f2091c44d89789f689d98bc244358878 f2091c44d89789f689d98bc244358878 process_name procdump.exe procdump.exe Field name Expected Found process_sha1 db1ef4ce56820c93a3b7f1fdf36d3fffc7d1ec96 process_sha256 e4ea34a7c2b51982a6c42c6367119f34bec9aeb9a60937836540035583a5b3bc Field name Expected Found process_path C:Sysinternalsprocdump.exe DeviceHarddiskVolume1Sysinternalsprocdump.exe process_pid 1528 1529
  • 38. Outline What is EDR telemetry? How Red Canary works Validation of ATT&CK techniques Automated validation workflow Lessons learned
  • 39. Telemetry quirks Signal/noise ratio different for each sensor ○ Lower quality telemetry (i.e. filemods & regmods) can be highly filtered ○ Filemod filtering by process, directory, and file type File telemetry has inconsistent meaning/terminology ○ What is a filemod? ○ Creation vs. modification
  • 40. Challenges of using EDR telemetry Level of detail is limited ○ Limited insight into certain types of behaviors like API calls ○ Can’t use static binary signatures outside of a hash ○ Certain telemetry types are limited because they’re noisy Example: Credential theft ○ Dumping lsass -> good telemetry ○ Application credential theft (e.g. browsers) -> limited/no telemetry ○ EDR sensors are good at generating alerts for this activity
  • 41. Benefits of using EDR telemetry Offloading detections from endpoints ○ Avoids limitations of analytics on endpoints ○ Highly scalable ○ Adversary can’t see alerts Versatile representation of behavior ○ Captures context ○ Useful for correlation
  • 42. Key takeaways EDR telemetry balances signal/noise Validating ATT&CK techniques using data components scales well End-to-end functional testing ○ Provides a clear signal when there’s a problem ○ Captures nuances of techniques Automation allows us to scale validation Con: EDR telemetry provides a limited level of detail Pro: EDR telemetry offloads detections from endpoints and provides context around an alert
  • 43. Questions? Team blog series: The Validated Canary Our validation philosophy https://redcanary.com/blog/detection-validation/ Unearthing changes in our detection engine with Coalmine https://redcanary.com/blog/coalmine/