2B. Attack Frameworks and Indicator Management obj 1.1, 1.2 Flashcards
Briefly describe reputational data
Blacklists of known threat sources (e.g., IP address ranges, malware signatures, domains)
What are IoCs?
Residual signs of an asset that has been successfully compromised/breached (e.g., IP addresses, rogue hardware, unknown port/protocol usage, registry/file system changes)
What is behavioural threat research?
The correlation of IoCs into attack patterns e.g., attacker might be using new IP address, but attack pattern resembles that of past attackers
What are the stages of the Cyber Kill Chain?
1) Reconnaissance
2) Weaponisation
3) Delivery
4) Exploitation
5) Installation
6) C2
7) Actions on objectives
Identify and describe stage one of the Cyber Kill Chain
- Reconnaissance. During this stage, the adversary is gathering intelligence about their target. This can be open-source or direct acquisition (via scanning). Vulns may be identified.
Identify and describe stage two of the Cyber Kill Chain
- Weaponisation. In this stage, malware is combined with an exploit to create a payload that can be delivered to the target.
Identify and describe stage three of the Cyber Kill Chain
- Delivery. The payload is delivered to the target via a method (e.g., phishing, USB, water holing)
Identify and describe stage four of the Cyber Kill Chain
- Exploitation. The payload is executed and exploits a vulnerability. e.g., this can be initiated by a victim being tricked into running code via a phishing email, or a drive-by-download
Identify and describe stage five of the Cyber Kill Chain
- Installation. Remote access tools/backdoors are installed to achieve persistence.
Identify and describe stage six of the Cyber Kill Chain
- C2. The payload establishes a connection to a remote server that the adversary can use to gain remote access and install further tools/malware
Identify and describe stage seven of the Cyber Kill Chain
Actions on objectives. The adversary takes actions to accomplish their goals (e.g., data exfiltration)
What does STIX stand for?
Structured Threat Information eXpression
What is STIX used for?
STIX is a language used to share CTI information in a standardised format. STIX v1 uses XML, while STIX v2 uses JSON.
What are some of the STIX domain objects?
Attack pattern,
malware,
threat actor,
tools,
goals,
motivations
What does TAXII stand for?
Trusted Automated eXchange of Indicator Information