2 Introduction An Advanced Persistent Threat is a cyberattack which is performed on a network, here the attackers gain access to the network in an unauthorized way and remain hidden for a long time and steal sensitive information like Personally identifiable information, Intellectual property etc. from the network over the period. The most effective way to detect the APTs in the network is through threat hunting. Threat hunting is the search for a malware in the network using automation, which has bypassed the security controls within the environment and accessed the network. There are different definitions for threat hunting and the Endgame states threat hunting as a process of searching for the signs of malicious activity in the network without knowing about the signs. This helps the security analyst to look for the security controls that are implemented which are not being detected. Threat hunting helps in reducing the dwell time of attackers inside the network and this is the main objective of threat hunting. The first step in threat hunting is to create a hypothesis which helps the security analysts to check whether a malicious activity is being taken place or not in the network and for the endgame process the MITRE ATT&CK matrix is being used to ease the generation of hypotheses since it contains a lot of techniques used by APT. There are three level of architecture MITRE ATT&CK matrix and they are tactics, techniques and procedures which is called as TTPs. Tactics is the column heading in the top of MATRIX, techniques represent the cells in each of the column and procedures consist of details for performing a technique. Major column headings in the MITRE ATT&CK are phases from the Attack Lifecycle by Mandiant. The Column heading are various phases of the Attack Lifecycle. Each phase of the matrix represents different techniques used by APTs. According to Richard Bejitlich the Network security monitoring is the process of collecting, analyzing and escalating all the indicators and alerts for detecting and responding to the intrusions on the network. NSM is something which helps the detect the intrusion in the network and respond to it before they perform something destructive to the organization. The NSM inspects all the network traffic for detecting threats in the network. This research helps in reducing the dwell time of an attacker within the network, since the security analysts are having both host-based and network-based techniques for performing the threat hunting. 3 Background Based on the research paper the definition for APT is an opponent who targets a network who has the ability, time and resources to create the required tools to bypass the security and access the network unauthorized and stay in the network for a long time. The objectives are different for different APT. There are a lot of APT incidents in the past 20 years and some of them are breach occurred in 2019 spring in Ticketmaster, Newegg and British Airways which focused on the consumer credit card records. Targeted ransomware campaigns which occurred in states of Georgia and Florida. Based on various financial attacks which had occurred Fireeye created term called FIN representing financially motivated attackers. The 2016 election result in the US was altered using the internet power. A group called APT 28 had hacked the Democratic National Committee and on further analysis it was figured that the attack was performed by a Russian-threat actor active from 2000 who was responsible for various campaigns against Aerospace, Energy, Defense, and various media sectors. It was found that Russian government mostly target the defense ministries. Another type of threat actor is hacktivists. They are anonymous and they target the victims to draw attention to their goals. In year 2010 DDoS attacks have been performed by anonymous against Mastercard, Amazon. The APT groups accomplish their goal without bothering about the difficult and the cost. A project called FMX was being started by MITRE in the year 2013 and the objective of the project was the detection of attackers in the network who had already accessed the system. This helps in mapping all the attacker lateral movement and the way the attacker had achieved the goal. The main objective behind the project to understand the attacker’s mindset while achieving the objective. The creator of MITRE ATT&CK matrix stated that many companies use IOCs as a strategy of security. The IOCs include IP address, domain names, hashes of file, certain unique strings found inside malware. The IOCs only last only for a short period of time. Threat actor uses different IOCs for attacking different organizations and FMX is something which helps to find threat actors based on the fingerprint. The biggest challenge in that time was the failure to have a framework for analyzing the attacker behaviour. This made it difficult to analyze the threat actor activity and as a result the forensics were restricted to IOCs or functionality of malware. For resolving the issue MITRE collect reports on APTs and extracted the various techniques used by each APT. Based on information from red team, MITRE created a list of known techniques and referred it to the public reports available on malware, threat actors and threat intelligence and groups were created based on different set of techniques. This is now called as tactics or the column headings. Now the MITRE ATT&CK framework helps in communicating about the host-based attacker behaviour and provides framework for analyzing the behaviour of APTs on the network. The genesis of the thesis was born in the year 2018. Then one researcher was working as incident responder and his main goal was creation of process and methodology for network threat hunting. The guidance was obtained from MITRE ATT&CK matrix like the ways to generate hypothesis, sources for hunting and activities to focus on. When they checked the MITRE ATT&CK website 4 it was found that they focus on endpoint behaviour, and it wasn’t practical, and this is how the current thesis was started. Methodology Techniques, tactics, and procedures (TTPs) TTPs are used for simulating the adversary behaviour. TTP shows the actions performed by the adversaries in a detailed manner. TTP is divided as Tactics, Techniques and Procedures. Tactics- The method an attacker choose for performing his attack till the end. It can be like how the initial compromise is done, lateral movement, how to remove his traces after the attack etc. Techniques- The strategies used for getting immediate results like sending malicious codes in document which gets executed after it is being opened, sending emails to the victims with malicious documents, using keystrokes for grabbing credit card information, using HTTP for the communicating with Command-and-Control server etc. Procedures- The information which the adversary searches inside the target network like creating malware for exploiting or bypassing the detection from endpoint tools, establishing a commandand-control server, send email to the victims, and for crafting socially engineered documents and emails which looks genuine. Adversary Models The process of an APT is described by two favoured models and they are Lockheed Martin Cyber Kill Chain and Mandiant Attack Lifecycle. Bryant Kill Chain is an evolution of both Lockheed Martin Cyber Kill Chain and Mandiant Attack. Cyber Kill Chain by Lockheed Martin This was the first attack model known to the public. This model shows the steps that the attacker needs to complete for achieving the goal. Even though this model was created from attacker perspective, this model was indented for defenders to be used. This model is not adequate for the defenders since it is not possible for the defenders to detect some of the attack phases. Weaponization is one of the phases in the model and here malicious documents or zero-day exploits are being used for controlling the target network and this cannot be detected. Figure 1 shows the different phases of the Cyber Kill Chain. Figure 1 - Cyber Kill Chain by Lockheed Martin 5 Note. From EventTracker Enterprise and the Cyber Kill Chain by Netsurion (https://www.netsurion.com/articles/eventtracker-enterprise-and-the-cyber-kill-chain ) There are two main reasons that this Cyber Kill Chain is not appropriate for the defenders the first one is the defenders are not able to detect weaponization phase and the second fact is that the visual representation of Cyber Kill Chain is wrong. It doesn’t represent the actions performed by the attackers but only displays the linear progression. Till the attackers reach their objective attackers continues to perform lateral movement, internal recon and there is another lifecycle created called Attack Life Cycle by Mandiant because of the flaws in the network. Attack life cycle by Mandiant The Mandiant Attack Life Cycle is something which can be used by both attacker and the defender for explaining the actions of various APT. Here all the phases can be detected by the defender including the weaponization phase and as a result this phase is being removed. A loop is being added for the representation of attacker’s path. This is one of the preferred attacker models in the community. There are phases which cannot be detected in attack life cycle and one such is privilege escalation. This is a phase which happens to the host and as a result this cannot be detected from the network. Figure 2 shows the Attack life cycle by Mandiant. Figure 2- Mandiant Attack Lifecycle (Cyber attack lifecycle, 2015) Bryant Kill Chain The Bryant Kill Chain is mainly focused on the analysis of the network and is an evolution of both Lockheed Martin Cyber Kill Chain and Mandiant Attack Lifecycle. With this Kill Chain except one all other phases are being acknowledged and that one is privilege escalation. This model 6 combines two models which are actions on objectives and the exfiltration since it is considered as part of it. Endgame’s threat hunting process There are six steps in the Endgame’s threat hunting process, and they are: proposing a hypothesis, identifying all the evidence for proving it, developing analytics, Automating, Documenting and Communicating and reporting it. Threat hunting process in action The first step is creating hypothesis. Scoped hypothesis should be created which provides definite conclusions. The conclusion should always state that whether signs of malware activity was detected or not in the environment based on the technique used. For generating scoped hypothesis, the MITRE ATT&CK matrix is used. The MITRE ATT&CK consists of different column heading which are different phases of Attack Lifecycle by Mandiant and from the research based on different APT groups. For example, if we look at the column lateral movement. This contains information regarding the various techniques used by the attackers to perform lateral movement. If we want to hunt for lateral movement in our environment, we can select one technique from the column Lateral movement and use that for creating hypothesis. If we find that SMB was being used for performing lateral movement the hypothesis will be attackers are using SMB for performing lateral movement through the network and the sub-hypothesis will be that PsExec was being compromised to connect to SMB for performing lateral movement. The next step is collecting more evidence for proving the hypothesis or vice verse. After the collection of valid data, the datasets are being cut short for easy analysis. When the reduced dataset is constructed both the connection and reduction processes are automated. When this is done it is documented like by providing the decisions taken for reducing the dataset etc. All the findings need to be reported and documented and absence of malicious activity doesn’t confirm that the hunt is not successful, but it shows that the security controls are working perfectly, and the security analyst filtering doesn’t have any malicious activity and the result was interpreted correctly by the security analyst. Based on the MITRE ATT&CK, it encourages the security analyst to hunt for threats in the network based on behaviour of APT in the network and for analyzing the APTs network monitoring tool Zeek can be used for analyzing the traffic to detect the malicious behaviour. Criteria for network security monitoring There are a lot of NSM platform available, and the difficult part is selecting the best NSM. There are some criteria for selecting the NSM and the first one is that NSM should be protocol aware and should also provide timeline of the events. For example, if malware communities with HTTP on port 443 the protocol aware NSM doesn’t think that the traffic is encrypted, and it scans the traffic thoroughly. What is meant by timeline of events is that if a machine is infected with ransomware and it spreads to another machine the NSM should generate the timeline of events starting from the initial beacon which is setup in the first machine to the C2 server. After this it should provide timeline for other machines which are infected and provide scope to the incidents. 7 The next criteria are that NSM should be having various level of fidelity. There are various logging levels in the NSM platform, and they are statistical based logging, event-based logging, full PCAP capturing logging and session data, and these are ordered using fidelity. From this the first one shows the volume and nature of the data which is moving across the network. The statistical logging helps in detect the traffic with irregular volumes and beacons in the network. The beacons communicate to the C2 in certain interval of time, and this can be easily analyzed with statistical data. With the help of statistical data exfiltration can also be detected by examining the huge amount of data which leaves the network. The third one is event-based systems. Here alerts are being triggered when the predefined conditions set are found in the network. This is one of the popular options used in most enterprise networks and this only create alerts when the condition defined matches. For example, if we look at the signature here alert tcp $EXTERNAL_NET 443 -> $HOME_NET any (msg:"ET TROJAN FAKE AOL SSL Cert APT1"; flow:established,from_server; content:"|7c a2 74 d0 fb c3 d1 54 b3 d1 a3 00 62 e3 7e f6|"; content:"|55 04 03|"; content:"|0c|mail.aol.com"; distance:1; within:13; reference:url,www.mandiant.com/apt1; classtype:trojan-activity; sid:2016469; rev:3;) (Bornholm, 2019) The signature is created for detecting APT1 in the network. The signature has three contents which looks for a certificate with serial number starting with “7c a2 74” and mail.aol.com which will be issuer of the certificate. The signature will be triggered only when all the criteria matches. Here the traffic expected is from the port 443 which is used by HTTP to the home network. The distance is 1 here and if only all the criteria match, the alert will be triggered. The conversion between two network nodes are collected by session data and this includes the IP address, Source and destination port, source and destination IP, protocol, the application bytes sent from source to destination. There are other information which provides more about the connection like HTTP method or URI which is used for connection etc. For example, the session data is used for detection of SMB calls through PsExec which was initially initiated from Windows server machine. Full packet logging is basically the collection of the data which is transferred between the different systems which helps the incident response team to develop signatures monitor the activities and to find the data which is being stolen. For the investigation of the alerts the Full PCAP data can be used, and it also provides fidelity since it shows the actual data transferred. If it was a requirement for a full pcap capture it becomes difficult for the small businesses. It was reported that a link of 1 GB saturated link can generate up to PCAP which is almost 6TB in length and based on this requirement it will become difficult for small businesses to store the data in cloud storages. The hardware for this will be very difficult and in order to solve the problem an open-source solution like Zeek can be used. Zeek was tested within organizations with almost 100G links and based on the Berkely labs Zeek can run in commodity hardware. Network security Monitoring Criteria 8 There are different criteria for network security monitoring, and they are: Should be an open-source platform, shouldn’t be a part of tools like SecurityOnion, it should be having an extensible framework and rules engine, Protocol aware and should have Network monitoring fidelity. Here the network-based fidelity can be divided into four: Statistics- Generating the high-level statistics helps to analyze the volume and nature of the data Event-based – Generates when the predefined conditions matches and when it is detected on the network. Session data- The conversion between two network nodes are collected by session data and this includes the IP address, Source and destination port, source and destination IP, protocol, the application bytes sent from source to destination. Full content data- Capturing all the traffic in the network. The next criteria is to have a timeline which shows detailed network events, provide scope on the incident and should be having a considerate hardware requirement. Network security monitoring platform comparison Multiple platforms are available for monitoring the network activity and based on criteria which was discussed Zeek scores more. The NSM platforms which was selected for comparison was Zeek, Suricata, Snort and Molach. Based on the comparison it was found that Suricata and Snort doesn’t provide scope and Molach doesn’t work based on a considerate hardware. So as shown in Figure 3 Zeek is the best platform to be used for NSM. Figure 3 – NSM platform comparison (Bornholm, 2019) Adversary emulation This is defined by SANs as activity where the operation of an adversary is emulated by the security experts and the main objective is to make the organization more resilient against the techniques used by adversaries. For leveraging an attacker emulation platform first an environment is created which is being monitored by Zeek for performing its activities. The network consists of three machines in which two machines which are having an operating system of Windows 10 are being 9 connected to domain controller on Windows server machine. When the attack simulation is completed the Zeek logs are being analyzed and based on the logs heat maps are being created based on the techniques used and discovered. The objective here is to show the efficiency of the matrix by comparing both techniques used by the attacker for simulating the threat actor and the techniques in the matrix. Adversary emulation process The adversary emulation process consists of 5 simple processes: • • • • • Gathering threat intelligence about threat actors Extraction of the techniques which are being used by threat actor Analyze and Organize Developing tools Emulating the adversary (Bornholm, 2019) First step is the identification of the adversary which needs to be emulated and once a threat actor is identified then threat intelligence is gathered about threat actor and this information is not limited any sort of information which is gathered from Virus Total, IOCs, malware, APT reports etc. Next step is extraction of techniques which ate used by the threat actor and then mapping it to the MITRE ATT&CK matrix. This research provides matrix of techniques from the network aspect which allows the security analysts for mapping the network techniques. The third step is analyzing and organizing the techniques which are extracted. First a goal should be set like if threat actor APT3 is known fir stealing IP. Once goal is set the different techniques which are used by the threat actor for planning the technique flow. Once that is set the flaw is divided into two phases which could be done within a period. Figure 4 describes the emulation plan. Figure 4: Emulation plan APT3 (Bornholm, 2019) The next step is to develop proper tools to accomplish the emulation. The tools selected needs to be based on threat actor and techniques. Once the tools are developed, payloads should be created for emulation of the adversary and shouldn’t be based on signature detection and lastly the adversary should be emulated. The timeline of threat actor is one thing which needs to be noted and after it is finished, both red and the blue team could discuss about the detection, prevents etc. Criteria for adversary emulation platform 10 When it is stated by an emulation platform that it can emulate the APT it means that it should be able to perform various techniques from the Mandiant attack lifecycle phases. The techniques used should be based on the threat group for the different phases. Plethora of post-exploitation techniques should be contained in the platform for emulating the APT fully. For example, if APT3 uses 13 techniques for credential access, 3 for lateral movement, 8 for defense evasion and 7 for persistence. It is possible that APT3 used just 6 techniques within the MIRE ATT&CK matrix and rest techniques from outside. This shows the necessity to have multiple communication methods for the C2 by the attacker emulation platform. Lastly the emulation platform needs to perform defense evasion. For accomplishing this there are two themes which are bypassing security controls and thwart signature detection. Disabling antivirus software or being aware of a weakness that won't be picked up by the programme are two easy ways to get around security measures. Additionally, the adversary's emulation artefacts signatures shouldn’t be created by the defenders which means for instance if a binary which related to adversary emulation is detected and signature is being developed for detecting the file hash, the defenders shouldn’t use the hash on a later point. There are different criteria’s which are added by the researchers like extensible framework, mapping techniques to the MITRE ATT&CK by the platform, capable to perform full chain attacks and generation of both logging and reporting. First the platform should be mapping the techniques to MITRE ATT&CK matrix. When Scythe capabilities are compared to the open-source projects, this exceeds the other platforms. The emulation platform should be capable for running full-chain attacks. Next the platform should be able to generate payload, do initial compromise, place persistence, escalate privileges, perform lateral movement, and do exfiltration. After finishing all the steps, a detailed report which includes the timeline of events, network and forensic artifacts should be provided by the platform. Adversary emulation criteria • • • • • • • • • • Firstly, it should be paid or an open-source platform and if it is open-source then project should be maintained. All the techniques should be mapped to MITRE ATT&CK matrix. The framework should be extensible which can be added or modified. Should be capable to perform full chain attacks and also has the capability for performing the different phases of Mandiant attack lifecycle. It should be able to perform attack behaviour like external reconnaissance on targets. Should be able to generate payloads and this process is called weaponization. The platform should be able to perform initial compromise. It has ability to establish foothold and can perform privilege escalations. The platform can perform attacker behaviour such as lateral movement, action on objectives (Exfiltration). Provides adequate post exploitation methods and various Command and Control channel modules and should be able to perform logging and reporting. Finally, the platform has the ability to bypass the security controls and could change the signatures to thwart signature both creation and detection. 11 Adversary emulation platform comparison Based on the comparison with different emulation platform it was discovered that various platforms can be used for emulation and Scythe was selected from all because of the highest score it scored based on the criteria explained above. The best platform therefore is Scythe. MITRE ATT&CK matrix as an open system The basic definition of system theory is that various parts which interact together to form a complex whole and the MITRE ATT&CK here is a system which consist of various parts which are TTPs of the APT. This is open source since it depends on different inputs for deriving the output. Here the input refers to the behaviour of adversary on the network. The creation of the TTPs is based on the intelligence classification. When there is collection of TTPs they are assigned to different groups which are called techniques and grouping of these techniques are called tactics and the tools or commands which are used for accomplishing the technique is called procedures. Due to the absence of new TTP as source of input it is considered feedback loop. Feedback helps in validating the model in the current state and make sure that they are usable. The feedback helps in improving and tracking both success and failure of the model. Process and method Preface This starts with the creation of foundational matrix which is the template for all the heatmaps for all the experiments. The core of heatmap is to measure efficacy of the matrix for the detection of APT on the network and to check validity of the technique. The three experiments which are analyzed are APT reports, PCAP analysis and adversary emulation. The experimet1 consist of a variety of APT reports and this helps to measure the efficacy of the matrix against the APT groups. The APT reports are selected because it shows the efficacy of the matrix in a publicly released threat intelligence. These are open source which helps to reproduce the experiments. The second experiment uses Scythe Adversary emulation platform for emulating the APT. It starts by initial compromise in the network and once it is done it follows instructions to perform lateral movement in the network and for exfiltrating the data. The third experiment uses the dataset from 2017 National collegiate Cyber Defense Competition which is obtained from ImpactCyberTrust organization. This is a attacker vs defender event where enterprise network is defended from the red team network. Building the foundational matrix Preface First of all, for an attacker model is required for describing the actions performed by the attackers from network perspective. The attacker model here is Bryant Kill Chain and this generates the initial column headings. This model provides the keywords for searching inside the APT reports for filling the columns based on the techniques. Next for generating the list of techniques used by 12 the APTs the APT report repositories are used as the threat intelligence. This is known as the foundation matrix, and this is used as the template for the heatmaps. The heatmap main objective is to measure efficacy of the matrix for APT detected and for measuring the validity of the techniques which are used. Attack themes The column headings in the matrix represent the different phases of an APT and this is calculated from network perspective and called attack themes. The attack theme evasion represents techniques which is used by the APT groups or evading detection. This is a behaviour of the techniques performed by APT in the network. Bryant Kill Chain attack themes include Recon and weaponization, Lateral movement, initial compromise, Delivery and actions on objectives (Bornholm, 2019). Internal recon, Impersonation, Evasion, DOS and Command and Control are attack themes in the literature review (Bornholm, 2019). Aggregating techniques Validating our APT sources The foundational matrix composes of techniques which are used APTs and this shows that only referenced techniques are foundation on the foundational matrix. When the report was written there were 0 academic reports on Advanced Persistent Threat and as a result the reference for this academic paper uses publicly unvetted sources. Here the APT report repositories used are collection of APT reports used in both academic reports and released publicly. Reviewing APT sources The Bryant kill chain provides keywords to search in the reports. Reading a lot of reports are not practical and as a result a python script was developed which uses keywords and directory of the PDFs and this script scan all the PDF for keywords. For example, a keyword like command and control is detected in the PDF it will be recorded and later it is tested manually by human. When this was compiled, this helped the researchers for the PDF reports. Next the researcher opens the PDF and then look fir the keyword and the context may show a previous or new technique. When a new technique is being detected it will be added to the matrix and this will be added to the keyword list. For the technique which is added to the matrix a set of APT reports and groups will be used for referencing the operation of the technique. Next the keyword added will be used again for scanning APT reports and researcher will open the PDF and search again for the obtaining the context and this process is repeated till foundation matrix used by the APTs are constructed. When the attack techniques are discovered, new attack themes are also identified. This is discovered while reading more about the context of the techniques. For example, if a report uses the HTTPs of command-and-control technique then additional context includes information about encryption. HTTPs is not classified as a new technique, but the encryption used for evading the 13 detection is considered as technique. Therefor a new theme is created called evasion for techniques like encryption, encoding, compression etc. So, for validating the column, more than one technique is used. Each APT report which is referencing a new technique is validated by technique used by APT and multiple techniques in the column validates the theme. Foundational matrix Figure 5 displays the foundational matrix Figure 5: Foundational matrix (Bornholm, 2019) Matrix heatmap – APT reports The foundational matrix is being used for the creation of the heatmap. As the heatmap shown in Figure 6 validates various APT reports which reference various techniques used. The heatmap conveys the validity of each technique based on the APT report. The color used on the heatmap is based on the scheme explained the APT report heatmap section. The red colour represents 1 APT report and the green represent more than 5. The yellow colour occurs more than 13 times and this shows that 13 techniques have more than 2-4 reports referencing the technique and last column is percentage of the colour count based on total count. The report will only be shown in the matrix when at least one report references the techniques used by the APT. A heatmap will be the conclusions for experiments performed. Based on all the experiments a final heatmap will be generated and this decides existence of the techniques on the heatmap. APT report Heatmap key Red – the number of sources is 1, count is 3 and percentage is 6.98%. Yellow - the number of sources is 2-4, count is 13 and percentage is 30.23%. Green - Sources are more than 5, count is 27 and percentage is 62.79%. (Bornholm, 2019) 14 Figure 6- APT report heatmap (Bornholm, 2019) Experiments Experiment 1: APT reports Preface Here for the experiment 1 three different test cases are being used and each one of them specifies different threat actors which means APT groups. Public reports are being gathered about the threat actor by the researchers and then the techniques used by the attackers observed from a network perspective is being noted. After gathering a list of network-based techniques from threat actor heatmap is created. This displays the efficacy of the matrix and also helps in the easy detection of that particular threat actor. Criteria for choosing threat actor The experiment 1 included three test cases and each case there is different threat actors. The threat actors used here are APT41, APT3 and APT39. Each test case has different motivation, techniques and capabilities. The first test is the analysis of APT41. This was chosen randomly. This is not recommended but since it is unknown what the APT target, this random APT was chosen for the illustrating the efficacy of the matrix vs a random APT. APT41 is a well-known state-sponsored espionage outfit from China that targets businesses in both the public and private sectors as well as engaging in financially driven action for individual benefit. It was active from the year 2012 and targets organization like healthcare, video game industries in various countries and technologies. The APT 41 target is aligned with China’s economic development plans. They access the production 15 environments for injecting malicious codes in legitimate files which later distributed to the victim (APT41). For the second test case, the APT3 was analyzed. This was selected since it was known APT group, and this is the APT which is emulated in the experiment 2. Another reason is that there is a paper issued by MITRE about APT3 on ways to emulate APT3. The use of this APT helped to analyze APT3 from perspective of threat intelligence. This helps to make sure that emulation platform emulated APT3 accurately. In the third test case the APT39 is being analyzed. APT39 is cyberespionage activity which is conducted by the Iranian Ministry of Intelligence and Security from year 2014 (Mandiant, Apt39: An Iranian cyber espionage group focused on personal information). They are responsible for the widespread theft of the personal information, and they steal the personal information for supporting the monitoring, tracking and surveillance operations of Iran. APT 39 is known to leverage the SEAWEED and CACHEMONEY backdoor (Mandiant, Apt39: An iranian cyber espionage group focused on personal information). The APT group target primarily the hospitality, travel, telecommunication and the academic industries throughout Asia, Africa, Europe and North America. Test case reporting model The report starts with description of threat actor, aliases which are known, techniques which are used which are mapped to MITRE ATT&CK matrix if available, known tools and malware which is used by the attacker and the references for it. Calculating efficacy of matrix vs threat actor The APT reports are read for each test case for the analysis of particular threat actor, network techniques which are extracted and for mapping it to the matrix for creation of the heatmap. This heatmap help to calculate the efficacy of the matrix vs a known threat actor. (Bornholm, 2019) For the test cases, count of all the techniques which are used by the threat actor which exist in the matrix and one which doesn’t exist are noted. For calculating the efficacy, the equation 1 shown below is used. Equation 1: Efficacy of matrix vs threat actor equation Here the equation uses ratio in the percentage format, and this is to display the efficacy of the matrix. The determined ratio will compare a certain APT group's network-specific tactics to their overall matrix-specific approaches. Here the techniques which are present in the matrix which are used in the APT group over the amount of the network techniques which are used by the APT group are the similar thing which is measured. Here the ratio helps in the detection of a particular threat actor. M = List of techniques on the matrix which is used by the APT group T = List of the total network techniques used by the APT group 16 Efficacy of matrix = M/T * 100 (Bornholm, 2019) Calculating efficacy of matrix vs all threat actor Here it uses the same premise as shown in the equation 1 and instead of a single threat actor used in equation, here efficacy of matrix vs. all threat actors are calculated. Equation 2: Efficacy of matrix vs threat actor equation Wm -> Prevalence of technique from all the threat actors Wt -> The total techniques which is used by the threat actors Wm = Σ prevalence of a technique from all threat actors Wt = Σ Total techniques used by all threat actors Efficacy of the matrix vs. all threat actors = Σ Wm / Σ Wt *100 (Bornholm, 2019) Test case 1: APT 41 Description APT41 is a well-known state-sponsored espionage outfit from China that targets businesses in both the public and private sectors as well as engaging in financially driven action for individual benefit. It was active from the year 2012 and targets organization like healthcare, video game industries in various countries and technologies. The APT 41 target is aligned with China’s economic development plans. They access the production environments for injecting malicious codes in legitimate files which later distributed to the victim (APT41). Aliases WICKED PANDA (APT41). Network techniques Recon and weaponization No techniques are found for the category. Lateral movement • • Remote Desktop Protocol APT41 use RDP sessions for performing lateral movement in the environment. SMB/Windows Admin Shares The implant files are shared using the Windows Admin Shares and the SMB services which are exposed in internet helps to grab the credentials for accessing the network and performing the objectives (Remote Services: SMB/windows admin shares). 17 Internal recon • • Port scanning The APT41 uses built in commands like ping, netstat for scanning the ports. Network sniffing APT41 uses tools for gathering information about the network. Initial compromise • • • Malicious stager Malicious payloads are injected by the APT 41 to the victim to compromise the system and get initial access to it. Exploit The APT group leverage many exploits in the operations, and it also uses the proof-ofconcept exploit code for CVE-2019-3396 (FireEye, [report] double dragon: APT41, a dual espionage and cyber crime). Spearphishing Attachment Send spear-phishing emails which contains malicious documents or compiled HTML which initially compromise the victim. Impersonation No techniques are found for the category. Evasion • • • Encryption The APT41 encrypts the malicious payloads created which helps to evade detection. Encoding The malware HIGHNOON.LINUX which is backdoor which utilizes the encoded base64 hosting strings for accessing the C2 address (FireEye, [report] double dragon: APT41, a dual espionage and cyber crime). Compression APT41 creates RAR archives of the files which are targeted for performing exfiltration (FireEye, [report] double dragon: APT41, a dual espionage and cyber crime). DOS No techniques are found for the category. Delivery • • Phishing Send spear-phishing emails which contains malicious documents or files Watering hole 18 The targeted organization is observed for a while and waterhole attacks are performed and initial compromise is performed (FireEye, [report] double dragon: APT41, a dual espionage and cyber crime). Command and control • • • • DNS DNS used by the APT41 for communicating with C2 HTTP APT41 used malware or tools like LIFEBOAT which is a backdoor for communicating to C2 over HTTP and CHINACHOP could execute the Microsoft .NET code using HTTP post commands. FTP Used by APT41 for exfiltrate the data separate from the Command and Control protocol (FireEye, [report] double dragon: APT41, a dual espionage and cyber crime). Dead Drop Resolver The APT group uses the Dead Drop Resolver method on the legitimate websites which subvert the network defenders (FireEye, [report] double dragon: APT41, a dual espionage and cyber crime). Actions on objective • Exfiltration They use exfiltration tools and perform exfiltration over physical and network medium and over Command and Control channel (FireEye, [report] double dragon: APT41, a dual espionage and cyber crime). Tools/malware ASPXSpy, BITSAdmin, BLACKCOFFEE, Certutil, China Chopper, Cobalt Strike, Derusbi, Empire, ftp, gh0st RAT, ipconfig, MESSAGETAP, Mimikatz, Net, netstat, njRAT, Ping, PlugX, PowerSploit, pwdump, ROCKBOOT, ShadowPad, Winnti for Linux, ZxShell (APT41). Heat Map Key Count Techniques used by threat 14 actor New techniques discovered 3 Efficacy of matrix 14/17 Total number of techniques 46 Percentage 30.43% 6.52% 82.35% 19 Recon and Weaponiza tion Public scanning services Lateral movement Internal recon Initial compromise Impersonat ion Evasi on DOS WMI Service enumeratio n Malicious stager VPN tunneling UDP Flood Vulnerabili ty scanning WinRM Port scanning SQL injection Trusted third party Anon ymo us servi ce Publi c servi ces SSH Hijacking Network sniffing Encr yptio n HTTP Flood SMB Exploit Phishing Reverse RDP tunnel Certificate impersonat ion Remote Desktop Domain spoofing Exploit ARP spoofing TCP flood Deli ver y Wat erin g hole Command and control Peer-topeer Action on objectives Pois one d torr ents Phis hin g IRC Defacement Exfiltration ICMP Enco ding DNS Cust om Proto col Cust om obfus catio n Com press ion Webshell Remote Admin Tools Listening service HTTP FTP Dead Drop Resolver Test case 2: APT 3 Description The threat group APT 3 is Chinese-based threat group. It was first found in 2010. This is linked to the Chinese Ministry of State Security. This had target myriad of international and US targets. On the report in September 2016, it was noticed that the group had change their focus from US victims and started targeting Hong Kong organizations (Cyware Labs, APT3: A nation-state sponsored adversary responsible for multiple high profile campaigns: Research and analysis). The report also included the fact that they are more focused in exfiltration of the documents. They target printers, 20 file shares and intellectual properties and they target organizations in different sectors like Defense, Aerospace, Transportation, Telecommunications (APT3). Aliases APT 3 Gothic Panda Pirpi UPS Team Buckeye Threat Group-0110 TG-0110 (APT3) Network techniques Recon and weaponization • No techniques are found for this category Lateral movement • • Remote Desktop Protocol APT 3 have used the Remote Desktop Protocol for persistence and they have interacted with the systems for browsing and copying the files (APT3). SMB/Windows Admin Shares APT 3 uses SMB/ Windows Admin Shares for copying files into it for performing lateral movement. They have targeted printers and the file shares (Endpoint protection). Internal recon • APT 3 have used port scanner, ping scans and perform remote system discoveries (APT3 adversary Emulation Plan - Mitre Corporation). Initial compromise • • • Phishing APT 3 has sent spearphishing emails which contains malicious links to the victim (Mandiant, Operation clandestine wolf – adobe flash Zero-Day in APT3 phishing campaign). Stager Malicious documents lead to download of stager. Exploits 0-day exploits on both windows machines and internet facing assets. Impersonation 21 • No techniques were found for this category. Evasion • • • • Custom Protocol They use custom C2 protocols. Encryption For C2 communication SSL is used by APT3. Compression While performing spear phishing attack the APT3 uses zip archives and uses RAR archives for email attachments. DOS • No techniques were found for this category. Delivery • • Phishing The initial compromises are performed using phishing by sending malicious documents Waterhole The targeted organization is observed for a while and waterhole attacks are performed and initial compromise is performed. Command and control • • • • FTP FTP is used by Pirpi for performing exfiltration. HTTP With a specified interval the APT3, HTTP C2 Listening service Telnet services are installed by PlugX (Mandiant, Operation clandestine wolf – adobe flash Zero-Day in APT3 phishing campaign). SOCKS5 The C2 server uses the port 1913 and the protocol SOCKS5 (Mandiant, Operation clandestine wolf – adobe flash Zero-Day in APT3 phishing campaign). Actions on objective • Exfiltration They are focused on the exfiltration of documents and target printers, file shares and intellectual properties and they target organizations in different sectors like Defense, Aerospace, Transportation, Telecommunications (Research: Trellix stories). Tools/malware 22 LaZagne OsInfo PlugX RemoteCMD schtasks SHOTPUT (APT3) Heat Map Key Count Techniques used by threat actor New techniques discovered Efficacy of matrix Total number of techniques Percentage 14 3 14/17 46 30.43% 6.52% 82.35% Recon and Weaponiza tion Public scanning services Lateral moveme nt WMI Internal recon Initial compromise Impersonat ion Evasi on DOS Service enumeration Malicious stager VPN tunneling UDP Flood Vulnerabili ty scanning WinRM Port scanning SQL injection Trusted third party Anon ymo us servi ce Publi c servi ces SSH Hijackin g Network sniffing Encr yptio n HTTP Flood SMB Remote Desktop Exploit Reverse RDP tunnel Phishing TCP flood Deli ver y Wat erin g hole Command and control Peer-topeer Action on objectives Pois one d torr ents Phis hin g IRC Defacement ICMP Certificate impersonat ion Enco ding DNS Domain spoofing Cust om Proto col Webshell Exfiltration 23 Exploit ARP spoofing Cust om obfus catio n Com press ion Remote Admin Tools Listening service HTTP FTP SOCKS5 Test case 3: APT 39 Description APT39 is cyberespionage activity which is conducted by the Iranian Ministry of Intelligence and Security from year 2014 (Mandiant, Apt39: An Iranian cyber espionage group focused on personal information). They are responsible for the widespread theft of the personal information, and they steal the personal information for supporting the monitoring, tracking and surveillance operations of Iran. APT 39 is known to leverage the SEAWEED and CACHEMONEY backdoor (Mandiant, Apt39: An iranian cyber espionage group focused on personal information). The APT group target primarily the hospitality, travel, telecommunication and the academic industries throughout Asia, Africa, Europe and North America. They target the individuals or entities which is considered for them by the Iranian Ministry of Intelligence and Security. Aliases REMIX KITTEN ITG07 Chafer Network techniques Recon and weaponization No techniques are found for the category. Lateral movement • • • SSH hijacking APT39 uses Secure Shell for moving laterally through the environment. SMB SMB is used for lateral movement. Remote Desktop 24 APT39 perform lateral movement and persistence through myriad tool like Remote Desktop Protocol and sometimes uses rdpwinst tool for managing multiple sessions (More on aptsim,1970). Internal recon • • Port scanning Internal reconnaissance is performed using custom scripts and free tools like portscanner, BLUETORCH (More on aptsim,1970). Network sniffing APT 39 uses various tools for gathering information about the network (More on aptsim,1970). Initial compromise • • • • Malicious stager Malicious payloads are injected by the APT 39 to the victim to compromise the system and get initial access to it. SQL injection APT 39 uses SQL injection for exploiting the public-facing applications. Exploit APT 39 exploit the vulnerable web servers inside the organization targeted and install web shell like ANTAX and ASPXSPY. Phishing Leveraged spearphishing emails are sent to the victim by the APT39 with malicious attachments and links which causes POWBAT infection (Mandiant, Apt39: An Iranian cyber espionage group focused on personal information). Impersonation • Trusted third party The malware scripts were embedded in Microsoft Office documents Evasion • • Encryption The malware files were encrypted for bypassing the detection from the defense. Compression APT 39 uses compression tools like WinRAR and 7-Zip on the stolen victim data for compressing and archiving it for bypassing detection. DOS No techniques are found for the category. 25 Delivery • Phishing Send spear phishing emails which contains malicious documents, files and links Command and control • • • DNS Remote access tools which are capable for leveraging the DNS in communications with the C2 are used by APT 39. HTTP HTTP is being used for communication with C2 by the APT group. SOCK5 Tools like PINKTRIP, REDTRIP and BLUETRIP which are custom made are used for creating the SOCK5 proxies among the hosts which are infected. Actions on objective • Exfiltration APT 39 exfiltrate the stolen victim data through the C2 communications. Tools/malware ASPXSpy Cadelspy CrackMapExec ftp MechaFlounder Mimikatz NBTscan PsExec pwdump Remexi Windows Credential Editor Heatmap Key Count Techniques used by threat actor Percentage 15 33.33% 26 New techniques discovered Efficacy of matrix Total number of techniques 2 15/17 45 4.44% 88.23% Recon and Weaponiza tion Public scanning services Lateral movement Internal recon Initial compromise Impersonat ion Evasi on DOS WMI Service enumeratio n Malicious stager VPN tunneling UDP Flood Vulnerabili ty scanning WinRM Port scanning SQL injection Trusted third party Anon ymo us servi ce Publi c servi ces SSH Hijacking Network sniffing Encr yptio n HTTP Flood SMB Exploit Phishing Reverse RDP tunnel Certificate impersonat ion Remote Desktop Domain spoofing Exploit ARP spoofing TCP flood Deli ver y Wat erin g hole Command and control Peer-topeer Action on objectives Pois one d torr ents Phis hin g IRC Defacement ICMP Enco ding DNS Cust om Proto col Cust om obfus catio n Com press ion Webshell Remote Admin Tools Listening service HTTP SOCK5 Reference APT3. APT3, Gothic Panda, Pirpi, UPS Team, Buckeye, Threat Group-0110, TG-0110, Group G0022 | MITRE ATT&CK®. (n.d.). Retrieved October 19, 2022, from https://attack.mitre.org/groups/G0022/ Exfiltration 27 APT3 adversary Emulation Plan - Mitre Corporation. (n.d.). Retrieved October 19, 2022, from https://attack.mitre.org/docs/APT3_Adversary_Emulation_Plan.pdf APT41. APT41, WICKED PANDA, Group G0096 | MITRE ATT&CK®. (n.d.). Retrieved October 19, 2022, from https://attack.mitre.org/groups/G0096/ Bornholm, B. (2019). Network-based Apt Profiler (thesis). Rochester Institute of Technology. Cyber attack lifecycle. Law Enforcement Cyber Center. (2015, October 27). Retrieved September 29, 2022, from https://www.iacpcybercenter.org/resource-center/what-is-cybercrime/cyber-attack-lifecycle/ Cyware Labs. (n.d.). APT3: A nation-state sponsored adversary responsible for multiple high profile campaigns: Research and analysis. Cyware Labs. Retrieved October 19, 2022, from https://cyware.com/blog/apt3-a-nation-state-sponsored-adversary-responsible-formultiple-high-profile-campaigns-f58c Endpoint protection. Endpoint Protection - Symantec Enterprise. (n.d.). Retrieved October 19, 2022, from https://community.broadcom.com/symantecenterprise/communities/communityhome/librarydocuments/viewdocument?DocumentKey=92a4528c-2bdb-498f-85c84273bfdc66aa&CommunityKey=1ecf5f55-9545-44d6-b0f44e4a7f5f5e68&tab=librarydocuments FireEye. (n.d.). [report] double dragon: APT41, a dual espionage and cyber crime. FireEye. Retrieved October 19, 2022, from https://content.fireeye.com/apt-41/rpt-apt41 Mandiant. (n.d.). Apt39: An iranian cyber espionage group focused on personal information. Mandiant. Retrieved October 19, 2022, from https://www.mandiant.com/resources/blog/apt39-iranian-cyber-espionage-group-focusedon-personal-information Mandiant. (n.d.). Operation clandestine wolf – adobe flash Zero-Day in APT3 phishing campaign. Mandiant. Retrieved October 19, 2022, from https://www.mandiant.com/resources/blog/operation-clandestine-wolf-adobe-flash-zeroday Remote Services: SMB/windows admin shares. Remote Services: SMB/Windows Admin Shares, Sub-technique T1021.002 - Enterprise | MITRE ATT&CK®. (n.d.). Retrieved October 19, 2022, from https://attack.mitre.org/techniques/T1021/002/ Research: Trellix stories. Trellix. (n.d.). Retrieved October 19, 2022, from https://www.trellix.com/en-us/about/newsroom/stories/research.html Valsmith. (1970, January 1). More on aptsim. Carnal0wnage Blog. Retrieved October 19, 2022, from https://blog.carnal0wnage.com/2012/09/more-on-aptsim.html 28