Applying the MITRE ATT&CK Framework
Course 3942
1 DAY COURSE
Course Outline
In this course, you will gain a foundational understanding of the MITRE ATT&CK Framework. Topics covered include its definition, the goals it aims to achieve, and its essential components, such as matrices, tactics, techniques, data sources, mitigations, groups, software, campaigns, and model relationships.
Through a case study, you'll explore the real world to illustrate how these components are interconnected. You'll explore the process of prioritizing techniques using cyber threat intelligence (CTI) and assess the effectiveness of current defensive measures.
Applying the MITRE ATT&CK Framework Benefits
-
In this course, you will learn how to:
- Develop a strong foundational knowledge of the MITRE ATT&CK Framework and its components.
- Apply the framework to real-world cyber threats, such as the SolarWinds supply chain attack.
- Learn how to map threat intelligence, alerts, and adversary behaviors to ATT&CK.
- Use ATT&CK-mapped data to make informed and prioritized defensive recommendations.
- Understand the role of cyber threat intelligence and its practical applications in security.
-
Training Prerequisites
Basic knowledge of cybersecurity concepts and terminology is recommended but not required.
MITRE ATT&CK Framework Training Outline
Chapter 1: Fundamentals of MITRE ATT&CK Framework
MITRE ATT&CK Framework Definition
Goal of MITRE ATT&CK Framework
Matrices
Tactics and Techniques
Data Sources
Mitigations
Groups
Software
Campaigns
MITRE ATT&CK Model Relationships
MITRE ATT&CK Model Relationships Example
Breakdown of Tactics, Techniques, Procedures, Mitigations, and Detection
TeamTNT
- Mitigations
- Detection
Chapter 2: Mapping SolarWinds Supply Chain Attack to MITRE ATT&CK Framework
SolarWinds Compromise Background Information
Software Components of SolarWinds Compromise
- SUNBURST and SUNSPOT
Mapping the Indicators to MITRE ATT&CK Framework
Loosely Linking Everything Together for SolarWinds
ATT&CK Navigator
- SolarWinds ATT&CK Navigator
SolarWinds Attack Timeline
Indicators of Compromise (IOC)
Mitigations That Might Reduce the Likelihood and/or Impact of Supply Chain Attacks
Review of SolarWinds Compromise and Ability to Link to ATT&CK
Chapter 3: Mapping Alerts, Adversaries, Behaviors, and TTPs to MITRE ATT&CK
Mapping Threat Intelligence to ATT&CK
- Cyber Threat Intelligence (CTI) and IoBs
- Analyzing Behavior
- UEBA Data Sources
- Data Drawn From Above Sources
Snake Malware and Turla CTI Advisories and Alerts
- Research Advisory and Alert Information
- Adversary Behavior
- Volatility Plugin
- Network Intrusion Detection Systems (NIDS)
- Host-Based Detection
- Non-Standard Icon Size and Yara Rule
- Memory Analysis
Practical Research Exercise
- Initial Analysis
- Mapping Data to MITRE ATT&CK
- Compare Results to Improve Mapping
Pyramid of Pain
Chapter 4: Make Defensive Recommendations From ATT&CK Mapped Data
Use Collected and Analyzed Data to Make Initial Recommendations
Process for Making Recommendations
Ways to Determine Priority of Techniques Using CTI
Assess Current Defensive Measures and Their Effectiveness
- MITRE CAR and D3FEND
- MITRE’s Cyber Analytics Repository (CAR)
- MITRE D3FEND
- MITRE ATT&CK and D3FEND
MITRE D3FEND Practical Exercise
MITRE D3FEND Practical Exercise Answer
Research Additional Defensive Options and Organizational Capabilities/Constraints
Consider Tradeoffs for Each Option
Sample Pros and Cons of Options
Make Recommendations
Make Recommendations—Supply Chain Compromise
Private Team Training
Interested in this course for your team? Please complete and submit the form below and we will contact you to discuss your needs and budget.