MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK, Emma MacMullan and Justin Sherenco, General Electric
The document discusses the operationalization of the ATT&CK framework to enhance cybersecurity detection and response through improved inter-team collaboration and automation. Key points include the importance of breaking down silos between Intel and CIRT teams, leveraging behavioral-based detection, and utilizing metadata for better analytic outcomes. The outcomes suggest a substantial increase in alert accuracy with a noted 124% higher true positive rate from ATT&CK alerts.
MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK, Emma MacMullan and Justin Sherenco, General Electric
1.
Confidential. Not tobe copied, distributed, or reproduced without prior approval.
Summiting the Pyramid of Pain:
Operationalizing ATT&CK
2.
Bios
2
Justin Sherenco
Senior StaffIncident Responder
General Electric
ü 8 years at GE Working in IT for 18 years, 13 years
in direct security and #DIRF responsibilities
ü In the summer you’ll find me and the family at state
parks
About me
Emma MacMullan
Staff Cyber Intelligence Analyst
General Electric
ü 2 years at GE Specializing in Chinese actor
intellectual property theft, PO for TIAMAT
ü Training to run my 3rd half marathon, lover of
kayaking and international travel
About me
Behavioral based detection
Automationof traditional indicators
The Pyramid of Pain
Hash Values
Tools
Network/Host Artifacts
Domain Names
IP Addresses
TTP
4http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html
5.
Intelligence Driven Defense(IDD) and ATT&CK
5
Key Takeaways
1 Intel and CIRT need to break out of siloed operations
àAn automated platform can ensure continuity among teams throughout the wing-to-wing process
2 ATT&CK
àAn ATT&CK operational workflow serves as a common language between CIRT and Intel and drives better detection
Intel CIRT
OSINT collection
Actor tracking
and malware
analysis
IOC processing
Detection
creation
Incident/alert
response
Ad hoc
Behavioral based detection
Automationof traditional indicators
Content development
Hash Values
Tools
Network/Host Artifacts
Domain Names
IP Addresses
TTP
16http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html
17.
Signature VS Behaviors
17
Signature
Alert
•Critical
• High
• Medium
• Low
Behavior
Meta
• Tactic
• Technique
• Campaign
• Fidelity
Analytics
• Temporal
• Cluster
• Other
Alert
• Critical
• High
• Medium
• Low
26
What can themetadata tell us about our tools?
Confidence profiles Determine tools abilities to detect on MITRE data sources
Vendor X
27.
There’s always valuein the metadata…
25
Key Takeaways
1 Operationalization
àIntegrated cross-team operations breaks down siloes and enables better communication, leading to higher fidelity alerts and better detection
2 Intelligence driven defense
àIntelligence can drive and support the creation of detection tailored to behavioral trends observed in the wild
3 Value in the metadata
àHosting cross-team operations in a single tool allows for more complex analysis and a better understanding of behavioral coverage and threat trends
What can the operationalization of ATT&CK enable?
Behavioral coverage and
capabilities analytics
ATT&CK alerts have a 124%
higher true positive rate
124%
In progress: actor tracking
and prioritization