MITRE | TryHackMe — Walkthrough

jcm3
20 min readFeb 13, 2024

Hey all, this is the sixth installment in my walkthrough series on TryHackMe’s SOC Level 1 path and the sixth room in this module on Cyber Defense Frameworks.

This room will discuss the various resources MITRE has made available for the cybersecurity community.

Link: https://tryhackme.com/room/mitre

Let’s get into it!

Task 1: Introduction to MITRE

For those that are new to the cybersecurity field, you probably never heard of MITRE. Those of us that have been around might only associate MITRE with CVEs (Common Vulnerabilities and Exposures) list, which is one resource you’ll probably check when searching for an exploit for a given vulnerability. But MITRE researches in many areas, outside of cybersecurity, for the ‘safety, stability, and well-being of our nation.’ These areas include artificial intelligence, health informatics, space security, to name a few.

From Mitre.org: “At MITRE, we solve problems for a safer world. Through our federally funded R&D centers and public-private partnerships, we work across government to tackle challenges to the safety, stability, and well-being of our nation.

In this room, we will focus on other projects/research that the US-based non-profit MITRE Corporation has created for the cybersecurity community, specifically:

  • ATT&CK® (Adversarial Tactics, Techniques, and Common Knowledge) Framework
  • CAR (Cyber Analytics Repository) Knowledge Base
  • ENGAGE (sorry, not a fancy acronym)
  • D3FEND (Detection, Denial, and Disruption Framework Empowering Network Defense)
  • AEP (ATT&CK Emulation Plans)

Let’s dive in, shall we…

Task 2: Basic Terminology

Before diving in, let’s briefly discuss a few terms that you will often hear when dealing with the framework, threat intelligence, etc.

APT is an acronym for Advanced Persistent Threat. This can be considered a team/group (threat group), or even country (nation-state group), that engages in long-term attacks against organizations and/or countries. The term ‘advanced’ can be misleading as it will tend to cause us to believe that each APT group all have some super-weapon, e.i. a zero-day exploit, that they use. That is not the case. As we will see a bit later, the techniques these APT groups use are quite common and can be detected with the right implementations in place. You can view FireEye’s current list of APT groups here.

TTP is an acronym for Tactics, Techniques, and Procedures, but what does each of these terms mean?

  • The Tactic is the adversary’s goal or objective.
  • The Technique is how the adversary achieves the goal or objective.
  • The Procedure is how the technique is executed.

If that is not that clear now, don’t worry. Hopefully, as you progress through each section, TTPs will make more sense.

Task 3: ATT&CK® Framework

What is the ATT&CK® framework? According to the website, “MITRE ATT&CK® is a globally-accessible knowledge base of adversary tactics and techniques based on real-world observations.” In 2013, MITRE began to address the need to record and document common TTPs (Tactics, Techniques, and Procedures) that APT (Advanced Persistent Threat) groups used against enterprise Windows networks. This started with an internal project known as FMX (Fort Meade Experiment). Within this project, selected security professionals were tasked to emulated adversarial TTPs against a network, and data was collected from the attacks on this network. The gathered data helped construct the beginning pieces of what we know today as the ATT&CK® framework.

The ATT&CK® framework has grown and expanded throughout the years. One notable expansion was that the framework focused solely on the Windows platform but has expanded to cover other platforms, such as macOS and Linux. The framework is heavily contributed to by many sources, such as security researchers and threat intelligence reports. Note this is not only a tool for blue teamers. The tool is also useful for red teamers.

If you haven’t done so, navigate to the ATT&CK® website.

Direct your attention to the bottom of the page to view the ATT&CK® Matrix for Enterprise. Across the top of the matrix, there are 14 categories. Each category contains the techniques an adversary could use to perform the tactic. The categories cover the seven-stage Cyber Attack Lifecycle (credit Lockheed Martin for the Cyber Kill Chain).

(ATT&CK Matrix v11.2)

Under Initial Access, there are 9 techniques. Some of the techniques have sub-techniques, such as Phishing.

If we click on the gray bar to the right, a new layer appears listing the sub-techniques.

To get a better understanding of this technique and it’s associated sub-techniques, click on Phishing.

We have been directed to a page dedicated to the technique known as Phishing and all related information regarding the technique, such as a brief description, Procedure Examples, and Mitigations.

You can alternatively resort to using the Search feature to retrieve all associated information regarding a given technique, sub-technique, and/or group.

Lastly, the same data can be viewed via the MITRE ATT&CK® Navigator: “The ATT&CK® Navigator is designed to provide basic navigation and annotation of ATT&CK® matrices, something that people are already doing today in tools like Excel. We’ve designed it to be simple and generic — you can use the Navigator to visualize your defensive coverage, your red/blue team planning, the frequency of detected techniques, or anything else you want to do.”

You can access the Navigator view when visiting a group or tool page. The ATT&CK® Navigator Layers button will be available.

In the sub-menu select view.

Let’s get acquainted with this tool. Click here to view the ATT&CK® Navigator for Carbanak.

At the top left, there are 3 sets of controls: selection controls, layer controls, and technique controls. I encourage you to inspect each of the options under each control to get familiar with them. The question mark at the far right will provide additional information regarding the navigator.

To summarize, we can use the ATT&CK Matrix to map a threat group to their tactics and techniques. There are various methods the search can be initiated.

The questions below will help you become more familiar with the ATT&CK®. It is recommended to start answering the questions from the Phishing page. Note, that this link is for version 8 of the ATT&CK Matrix.

Answer the questions below

3a. Besides Blue teamers, who else will use the ATT&CK Matrix? (Red Teamers, Purpe Teamers, SOC Managers?)

Answer: red teamers

3b. What is the ID for this technique?

The text preceding this question bank instructed to begin answering the questions from MITRE’s ATT&CK’s Phishing page, so that’s where we will find our answer:

Answer: T1566

3c. Based on this technique, what mitigation covers identifying social engineering techniques?

This is known to be potentially the most effective way to increase the security posture of an organization. Only as good as it’s weakest link, etc. We can find this answer on the same Phishing page, scroll down to Mitigations and your answer is waiting for you there:

3d. What are the data sources for Detection? (format: source1,source2,source3 with no spaces after commas)

Pretty self-explanatory here, scroll down to Detection and there are exactly three sources listed:

Answer: Application Log,File,Network Traffic

3e. What groups have used spear-phishing in their campaigns? (format: group1,group2)

Using the same Phishing link, we can scroll down to Procedure Examples, here there are only two groups listed. This is denoted by the letter prefix in the ID column, ‘G’ stands for group and ‘S’ denotes software.

Answer: axiom,gold southfield

3f. Based on the information for the first group, what are their associated groups?

To find this, we need to dive a layer deeper, click on the first group (or their ID) from the previous answer, Axiom, and we’ll be taken to their group page, then we can see the answer we’re looking for under the aptly named “Associated Group Descriptions”

Answer: Group 72

3g. What software is associated with this group that lists phishing as a technique?

Staying on Group 72’s group page, we can do a find on the page for “phishing”, this will get us three hits, but only one hit in the Software section, giving us our answer:

Answer: Hikit

3i. What is the description for this software?

Again, we’re going a layer deeper here, click on the name of the software (or its ID) from the previous answer, Hikit, to go to the software page for Hikit.

Answer: Hikit is malware that has been used by Axiom for late-stage persistence and exfiltration after the initial compromise.

3j. This group overlaps (slightly) with which other group?

Here, we go back to the Axiom group page, and within the description section for Axiom we will find the group that Axiom potentially overlaps with.

Answer: Winnti Group

3k. How many techniques are attributed to this group?

After figuring out which group they’re referring to (hint: it’s Axiom) just go to the Techniques Used section and count them up. I didn’t find a cleaner way to do this besides manual counting, let me know if you have one.

Answer: 15

Task 4: CAR Knowledge Base

Cyber Analytics Repository

The official definition of CAR is “The MITRE Cyber Analytics Repository (CAR) is a knowledge base of analytics developed by MITRE based on the MITRE ATT&CK® adversary model. CAR defines a data model that is leveraged in its pseudocode representations but also includes implementations directly targeted at specific tools (e.g., Splunk, EQL) in its analytics. With respect to coverage, CAR is focused on providing a set of validated and well-explained analytics, in particular with regards to their operating theory and rationale.

Instead of further attempting to explain what CAR is, let’s dive in. With our newly acquired knowledge from the previous section, we should feel comfortable and understand the information that CAR is providing to us.

Let’s begin our journey by reviewing CAR-2020–09–001: Scheduled Task — File Access.

Upon visiting the page, we’re given a brief description of the analytics and references to ATT&CK (technique, sub-technique, and tactic).

We’re also provided with Pseudocode and a query on how to search for this specific analytic within Splunk. A pseudocode is a plain, human-readable way to describe a set of instructions or algorithms that a program or system will perform.

Note the reference to Sysmon. If you’re not familiar with Sysmon, check out the Sysmon room.

To take full advantage of CAR, we can view the Full Analytic List or the CAR ATT&CK® Navigator layer to view all the analytics.

Full Analytic List

In the Full Analytic List view, we can see what implementations are available for any given analytic at a single glance, along with what OS platform it applies to.

CAR ATTACK Navigator

(The techniques highlighted in purple are the analytics currently in CAR)

Let’s look at another analytic to see a different implementation, CAR-2014–11–004: Remote PowerShell Sessions.

Under Implementations, a pseudocode is provided and an EQL version of the pseudocode. EQL (pronounced as ‘equal’), and it’s an acronym for Event Query Language. EQL can be utilized to query, parse, and organize Sysmon event data. You can read more about this here.

To summarize, CAR is a great place for finding analytics that takes us further than the Mitigation and Detection summaries in the ATT&CK® framework. This tool is not a replacement for ATT&CK® but an added resource.

Answer the questions below

4a. What tactic has an ID of TA0003?

Using MITRE ATT&CK, we can easily search for TA0003 and get our answer:

Answer: persistence

4b. What is the name of the library that is a collection of Zeek (BRO) scripts?

To find this answer, we need to use the first link provided to us by the task which takes us to the main CAR page. Close to the bottom we will find our answer:

Answer: BZAR

4c. What is the name of the technique for running executables with the same hash and different names?

Well, given the nature of the task, we can probably narrow down all of the available tactics to one of those currently in CAR. Looking through that list, one stands out above all others regarding the question:

Answer: masquerading

4d. Examine CAR-2013–05–004, besides Implementations, what additional information is provided to analysts to ensure coverage for this technique?

To find this information, just scroll down below Implementations and it’s right there:

Answer: unit tests

Task 5: MITRE Engage

MITRE ENGAGE

Per the website, “MITRE Engage is a framework for planning and discussing adversary engagement operations that empowers you to engage your adversaries and achieve your cybersecurity goals.

MITRE Engage is considered an Adversary Engagement Approach. This is accomplished by the implementation of Cyber Denial and Cyber Deception.

With Cyber Denial we prevent the adversary’s ability to conduct their operations and with Cyber Deception we intentionally plant artifacts to mislead the adversary.

The Engage website provides a starter kit to get you ‘started’ with the Adversary Engagement Approach. The starter kit is a collection of whitepapers and PDFs explaining various checklists, methodologies, and processes to get you started.

As with MITRE ATT&CK, Engage has its own matrix. Below is a visual of the Engage Matrix.

(Source: https://engage.mitre.org)

Let’s quickly explain each of these categories based on the information on the Engage website.

  • Prepare the set of operational actions that will lead to your desired outcome (input)
  • Expose adversaries when they trigger your deployed deception activities
  • Affect adversaries by performing actions that will have a negative impact on their operations
  • Elicit information by observing the adversary and learn more about their modus operandi (TTPs)
  • Understand the outcomes of the operational actions (output)

Refer to the Engage Handbook to learn more.

You can interact with the Engage Matrix Explorer. We can filter by information from MITRE ATT&CK.

Note that by default the matrix focuses on Operate, which entails Expose, Affect, and Elicit.

You can click on Prepare or Understand if you wish to focus solely on that part of the matrix.

That should be enough of an overview. We’ll leave it to you to explore the resources provided to you on this website.

Before moving on, let’s practice using this resource by answering the questions below.

Answer the questions below

5a. Under Prepare, what is ID SAC0002?

Click the link to the MITRE ENGAGE matrix, click Prepare, and then click through the available tactics until you find SAC0002. You could alternatively use some Google-fu to figure this out quicker, but I think that goes against the spirit of the task. They want you to navigate through the site and get comfortable with navigating the framework’s matrix. Anyways, here’s our answer:

Answer: Persona Creation

5b. What is the name of the resource to aid you with the engagement activity from the previous question?

I had to use the hint here, I think I probably checked every page except for the one under Tools > All Tools at the top. Once you’re there, the answer is obvious.

Answer: persona profile worksheet

5c. Which engagement activity baits a specific response from the adversary?

Looking at the matrix, one sticks out as the obvious choice:

Answer: lures

5d. What is the definition of Threat Model?

As I was looking for the answer for 5b, I came upon the MITRE ENGAGE Glossary, and that made it easy:

Answer: A risk assessment that models organizational strengths and weaknesses

Task 6: MITRE D3FEND

D3FEND

What is this MITRE resource? Per the D3FEND website, this resource is “A knowledge graph of cybersecurity countermeasures.

D3FEND is still in beta and is funded by the Cybersecurity Directorate of the NSA.

D3FEND stands for Detection, Denial, and Disruption Framework Empowering Network Defense.

At the time of this writing, there are 408 artifacts in the D3FEND matrix. See the below image.

Let’s take a quick look at one of the D3FENDs artifacts, such as Decoy File.

As you can see, you’re provided with information on what is the technique (definition), how the technique works (how it works), things to think about when implementing the technique (considerations), and how to utilize the technique (example).

Note, as with other MITRE resources, you can filter based on the ATT&CK matrix.

Since this resource is in beta and will change significantly in future releases, we won’t spend that much time on D3FEND.

The objective of this task is to make you aware of this MITRE resource and hopefully you’ll keep an eye on it as it matures in the future.

We will still encourage you to navigate the website a bit by answering the questions below.

Answer the questions below

6a. What is the first MITRE ATT&CK technique listed in the ATT&CK Lookup dropdown?

Answer: data obfuscation

6b. In D3FEND Inferred Relationships, what does the ATT&CK technique from the previous question produce?

The product can be found by clicking on the answer from the previous question and finding the output:

Answer: Outbound Internet Network Traffic

Task 7: ATT&CK® Emulation Plans

If these tools provided to us by MITRE are not enough, under MITRE ENGENUITY, we have CTID, the Adversary Emulation Library, and ATT&CK® Emulation Plans.

CTID

MITRE formed an organization named The Center of Threat-Informed Defense (CTID). This organization consists of various companies and vendors from around the globe. Their objective is to conduct research on cyber threats and their TTPs and share this research to improve cyber defense for all.

Some of the companies and vendors who are participants of CTID:

  • AttackIQ (founder)
  • Verizon
  • Microsoft (founder)
  • Red Canary (founder)
  • Splunk

Per the website, “Together with Participant organizations, we cultivate solutions for a safer world and advance threat-informed defense with open-source software, methodologies, and frameworks. By expanding upon the MITRE ATT&CK knowledge base, our work expands the global understanding of cyber adversaries and their tradecraft with the public release of data sets critical to better understanding adversarial behavior and their movements.

Adversary Emulation Library & ATT&CK® Emulations Plans

The Adversary Emulation Library is a public library making adversary emulation plans a free resource for blue/red teamers. The library and the emulations are a contribution from CTID. There are several ATT&CK® Emulation Plans currently available: APT3, APT29, and FIN6. The emulation plans are a step-by-step guide on how to mimic the specific threat group. If any of the C-Suite were to ask, “how would we fare if APT29 hits us?” This can easily be answered by referring to the results of the execution of the emulation plan.

Review the emulation plans to answer the questions below.

Answer the questions below

7a. In Phase 1 for the APT3 Emulation Plan, what is listed first?

This information can be found in the task in the linked adversary emulation plan for APT3, you can also find the full emulation plan here:

Answer: c2 setup

7b. Under Persistence, what binary was replaced with cmd.exe?

I found this answer by using the APT3 Adversary Emulation Field Manual spreadsheet, searching up cmd.exe and getting the answer. After verifying it was correct, I checked the hint to see if that’s how they wanted me to find it and they actually linked back to the Emulation Plan PDF. Either way you’ll get the answer, which is a super clever implementation of abusing the native Windows accessibility features (sticky keys).

Answer: sethc.exe

7c. Examining APT29, what C2 frameworks are listed in Scenario 1 Infrastructure? (format: tool1,tool2)

We can find this information using the APT29 link in the task:

Answer: pupy,metasploit framework

7d. What C2 framework is listed in Scenario 2 Infrastructure?

Same method here:

7e. Examine the emulation plan for Sandworm. What webshell is used for Scenario 1? Check MITRE ATT&CK for the Software ID for the webshell. What is the id? (format: webshell,id)

take that info and go put it into ATT&CK:

Answer: p.a.s.,S0598

Task 8: ATT&CK® and Threat Intelligence

Threat Intelligence (TI) or Cyber Threat Intelligence (CTI) is the information, or TTPs, attributed to the adversary. By using threat intelligence, as defenders, we can make better decisions regarding the defensive strategy. Large corporations might have an in-house team whose primary objective is to gather threat intelligence for other teams within the organization, aside from using threat intel already readily available. Some of this threat intel can be open source or through a subscription with a vendor, such as CrowdStrike. In contrast, many defenders wear multiple hats (roles) within some organizations, and they need to take time from their other tasks to focus on threat intelligence. To cater to the latter, we’ll work on a scenario of using ATT&CK® for threat intelligence. The goal of threat intelligence is to make the information actionable.

Scenario: You are a security analyst who works in the aviation sector. Your organization is moving their infrastructure to the cloud. Your goal is to use the ATT&CK® Matrix to gather threat intelligence on APT groups who might target this particular sector and use techniques targeting your areas of concern. You are checking to see if there are any gaps in coverage. After selecting a group, look over the selected group’s information and their tactics, techniques, etc.

Answer the questions below

8a. What is a group that targets your sector who has been in operation since at least 2013?

Using the ATT&CK Matrix, as instructed, I searched “Aviation” in the search box, with the results pane up, I then did a ctrl+f to search through that pane using “2013” and there was only one result, giving us the correct answer:

Answer: APT33

8b. As your organization is migrating to the cloud, is there anything attributed to this APT group that you should focus on? If so, what is it?

Diving into the APT33 group page, we can see a laundry list of techniques used by the group, run another ctrl+f to find our answer, there will be 3 results but only one of them is technique related:

Answer: cloud accounts

8c. What tool is associated with the technique from the previous question?

This is found in the same row as the answer to the previous question:

Answer: ruler

8d. Referring to the technique from question 2, what mitigation method suggests using SMS messages as an alternative for its implementation?

Here, we will click on the technique, Cloud Accounts, from question 8b.

Once on the cloud accounts technique page, scroll down to Mitigations, and you’ll find your answer there:

Answer: Multi-factor Authentication

8e. What platforms does the technique from question #2 affect?

Staying on that same page, we can see related platforms in the table on the right:

Answer: Azure AD, Google Workspace, IaaS, Office 365, SaaS

Task 9: Conclusion

In this room, we explored tools/resources that MITRE has provided to the security community. The room’s goal was to expose you to these resources and give you a foundational knowledge of their uses. Many vendors of security products and security teams across the globe consider these contributions from MITRE invaluable in the day-to-day efforts to thwart evil. The more information we have as defenders, the better we are equipped to fight back. Some of you might be looking to transition to become a SOC analyst, detection engineer, cyber threat analyst, etc. these tools/resources are a must to know.

As mentioned before, though, this is not only for defenders. As red teamers, these tools/resources are useful as well. Your objective is to mimic the adversary and attempt to bypass all the controls in place within the environment. With these resources, as the red teamer, you can effectively mimic a true adversary and communicate your findings in a common language that both sides can understand. In a nutshell, this is known as purple teaming.

This concludes the MITRE room and the Cyber Defense Frameworks module, the first of seven modules that make up the SOC Level 1 path on TryHackMe. This room was very fun in my opinion and quite informative. MITRE is a huge force in the cybersecurity space and I feel like this room could have been five times longer than it was and it still wouldn’t be long enough. However, we learned a ton about APT groups, how to view emulation plans to better understand how some of these attacks work, some of the tools and techniques they used, how they affect different industries, and ways in which to deal with them.

Thanks for joining me everybody, tomorrow we will begin the second of seven modules, Cyber Threat Intelligence, where we will dive head first into the Intro to Cyber Threat Intel room. See you there!

--

--

jcm3

Proud dad, WGU cybersecurity grad, future MS:Cybersecurity & Information Assurance, aspiring cybersecurity professional, top 2% on TryHackMe.