Confidential. Not to be copied, distributed, or reproduced without prior approval.
Summiting the Pyramid of Pain:
Operationalizing ATT&CK
Bios
2
Justin Sherenco
Senior Staff Incident Responder
General Electric
ü 8 years at GE Working in IT for 18 years, 13 years
in direct security and #DIRF responsibilities
ü In the summer you’ll find me and the family at state
parks
About me
Emma MacMullan
Staff Cyber Intelligence Analyst
General Electric
ü 2 years at GE Specializing in Chinese actor
intellectual property theft, PO for TIAMAT
ü Training to run my 3rd half marathon, lover of
kayaking and international travel
About me
Summiting the Pyramid
3
Behavioral based detection
Automation of traditional indicators
The Pyramid of Pain
Hash Values
Tools
Network/Host Artifacts
Domain Names
IP Addresses
TTP
4http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html
Intelligence Driven Defense (IDD) and ATT&CK
5
Key Takeaways
1 Intel and CIRT need to break out of siloed operations
àAn automated platform can ensure continuity among teams throughout the wing-to-wing process
2 ATT&CK
àAn ATT&CK operational workflow serves as a common language between CIRT and Intel and drives better detection
Intel CIRT
OSINT collection
Actor tracking
and malware
analysis
IOC processing
Detection
creation
Incident/alert
response
Ad hoc
Tagging behaviors while collecting intelligence
6
72 November 2018Edit Presentation Title in [Insert Tab > Header & Footer] |
Pre-automated intelligence processing
8
Original end-to-end ATT&CK process
Spreadsheet of Pain
9
Tiamat: an in-house end-to-end ATT&CK tool
10
11
Tiamat-enabled operationalized ATT&CK process
12
Intelligence ingestion
13
Quality assurance
14
Detection creation
Method of detection
15
Behavioral based detection
Automation of traditional indicators
Content development
Hash Values
Tools
Network/Host Artifacts
Domain Names
IP Addresses
TTP
16http://detect-respond.blogspot.com/2013/03/the-pyramid-of-pain.html
Signature VS Behaviors
17
Signature
Alert
• Critical
• High
• Medium
• Low
Behavior
Meta
• Tactic
• Technique
• Campaign
• Fidelity
Analytics
• Temporal
• Cluster
• Other
Alert
• Critical
• High
• Medium
• Low
Tools and data sources
18
Creating behaviors
19
TTPs
20
Hypothesis
21
Behavior
22
Content Development CD/CI
23
So what?
24
25
What can the metadata tell us about our coverage?
26
What can the metadata tell us about our tools?
Confidence profiles Determine tools abilities to detect on MITRE data sources
Vendor X
There’s always value in the metadata…
25
Key Takeaways
1 Operationalization
àIntegrated cross-team operations breaks down siloes and enables better communication, leading to higher fidelity alerts and better detection
2 Intelligence driven defense
àIntelligence can drive and support the creation of detection tailored to behavioral trends observed in the wild
3 Value in the metadata
àHosting cross-team operations in a single tool allows for more complex analysis and a better understanding of behavioral coverage and threat trends
What can the operationalization of ATT&CK enable?
Behavioral coverage and
capabilities analytics
ATT&CK alerts have a 124%
higher true positive rate
124%
In progress: actor tracking
and prioritization
Emma MacMullan
emma.macmullan@ge.com
28
Justin Sherenco
justin.sherenco@ge.com
@jsherenco
Contact Information

MITRE ATT&CKcon 2018: Summiting the Pyramid of Pain: Operationalizing ATT&CK, Emma MacMullan and Justin Sherenco, General Electric