krmaxwell / krmaxwell.github.io

Blog
MIT License
1 stars 2 forks source link

What the hell is a TTP anyway. #57

Open krmaxwell opened 9 years ago

sroberts commented 9 years ago

:raising_hand: I KNOW I KNOW I KNOW I KNOW!

krmaxwell commented 9 years ago

http://stixproject.github.io/data-model/1.1.1/ttp/TTPType/

TTPs are representations of the behavior or modus operandi of cyber adversaries. It is a term taken from the traditional military sphere and is used to characterize what an adversary does and how they do it in increasing levels of detail. For instance, to give a simple example, a tactic may be to use malware to steal credit card credentials. A related technique (at a lower level of detail) may be to send targeted emails to potential victims, which have documents attached containing malicious code which executes upon opening, captures credit card information from keystrokes, and uses http to communicate with a command and control server to transfer information. A related procedure (at a lower level of detail) may be to perform open source research to identify potentially gullible individuals, craft a convincing socially engineered email and document, create malware/exploit that will bypass current antivirus detection, establish a command and control server by registering a domain called mychasebank.org, and send mail to victims from a Gmail account called accounts-mychasebank@gmail.com.

TTPs consist of the specific adversary behavior (attack patterns, malware, exploits) exhibited, resources leveraged (tools, infrastructure, personas), information on the victims targeted (who, what or where), relevant ExploitTargets being targeted, intended effects, relevant kill chain phases, handling guidance, source of the TTP information, etc.

krmaxwell commented 9 years ago

VERY IMPORTANT - neither of the "T"s in "TTP" stand for "tools". I'm'a smack somebody silly the next time they do that.

krmaxwell commented 9 years ago

And IOCs are not soft TTPs.

sroberts commented 9 years ago

Tactics, Techniques, and Protocols or Procedures... either way.

krmaxwell commented 9 years ago

Yeah, I'm just frustrated about the "tools" bit.

krmaxwell commented 9 years ago

Another reference http://www.secureworks.com/cyber-threat-intelligence/advanced-persistent-threat/understand-the-threat/

sroberts commented 9 years ago

That's a solid resource.

krmaxwell commented 7 years ago

Oops, didn't mean to close this.