TTP Analysis
Google Threat Intelligence allows you to explore Threat Actors and Malware on the basis of the MITRE ATT&CK® Framework. Analyzing Threat Actors and Malware this way helps you explore threats in terms of adversary Tactics, Techniques, and Procedures (TTPs) based on real-world observations.
In the MITRE ATT&CK Framework:
- Tactics represent the route or path of a MITRE ATT&CK technique or sub-technique, which is the tactical goal (why) of an adversary.
- Techniques and sub-techniques represent how an adversary achieves a tactical goal by performing an action.
Google Threat Intelligence currently supports MITRE ATT&CK version 8 (v8).
After reading this article, you will be able to:
- Discover how to analyze Threat Actors and their associated TTPs by focusing on use cases for tightening your security controls throughout the attack lifecycle.
- Learn how to explore specific Malware families, using the role of Backdoor as an example filter.
Analyze Threat Actors using the Explore MITRE ATT&CK Dashboard
For example, say you want to explore the TTPs associated with five Actors targeting the automotive industry:
- UNC4393
- UNC2465
- UNC5806
- APT43
- UNC1069
To filter and analyze Threat Actors
-
Select Threat Landscape > TTP Analysis to go to the Explore MITRE ATT&CK dashboard
-
Choose Threat Actor from the Object Types (you might need to click View all if is not showing). This displays all Actors currently tracked by Google Threat Intelligence.
-
Select Automotive from the list of Targeted Industries filters to narrow your search.
-
From the resulting Threat Actor List we are going to select the first five for the example.
-
Click Analysis or Next to populate the MITRE ATT&CK heat map with TTPs specific to the Selected Actors.
If more than one Actor is selected and analyzed as per the MITRE ATT&CK framework, the heat map shows the number of selected Actors associated with each technique or sub-technique to aid in prioritizing mitigation efforts.If there are multiple sub-techniques associated with a technique, an expander arrow can be clicked to reveal them.
Hovering over a technique or sub-technique in the MITRE ATT&CK matrix will:
- Display a brief description of the technique. This helps you understand what the technique entails and how it's used by attackers.
- Visually highlight relevant Threat Actors. Threat Actors who utilize the selected technique will remain in their original color, while those who do not will be grayed out.
You can select and de-select Actors on the heat map page itself to easily compare Actor TTPs within the heat map view.
Download the MITRE ATT&CK heat map
You can download the MITRE ATT&CK (multi-actor) heat map as a CSV or JSON file for further analysis by clicking Download TTPs and choosing between Export to CSV and Export to JSON.
This allows you to filter and sort heat map data to aid in prioritizing mitigation efforts. For example, you can filter on specific techniques or sub-techniques for a given MITRE Category Name (or, tactic), and then sort Actor(s) Usage Count to focus on the most commonly used techniques.
The following fields are included in the exported CSV file:
- Tactic ID
- Tactic Name
- Technique ID
- Technique Name
- Sub-Technique IDs
- Sub-Technique Names
- Number of associated objects
- Actors IDs
- Actors Names
- Malware IDs
- Malware Names
- Campaigns IDs
- Campaigns Names
- Tools IDs
- Tools Names
- IoC Collections IDs
- IoC Collections Names
Analyze Malware using the Explore MITRE ATT&CK Dashboard
The workflow for exploring Malware is similar to exploring Actors, but with different filtering options. For example, suppose a recent report noted an increased use of backdoor Malware in your industry. A vulnerability scan of Malware in your environment included the following Malware families, so you want to explore them further to understand your associated risk:
- QAKBOT
- 3FEXE
- BEACON
- EXPLOSIVE
- CARWASH
To filter and analyze malware
- Select Threat Landscape > TTP Analysis to go to the Explore MITRE ATT&CK dashboard
- Write Backdoor in the search bar that says "Begin your search here".
- Choose Malware from the Object Types filter.
- Select the five Malware families noted in your vulnerability scan.
- Click Run TTP analysis to populate the MITRE ATT&CK heat map with TTPs specific to the selected Malware.
You can de-select Malware on the heat map page itself to easily compare Malware TTPs within the heat map view.
If more than one Malware is selected and analyzed in the MITRE ATT&CK framework, a heat map displays the number of selected Malware associated with each technique or sub-technique. You can download the heat map as a CSV or JSON for further analysis to aid in prioritizing mitigation efforts against the selected Malware families, check Download the MITRE ATT&CK heat map for more details.
Updated 5 days ago