You are on page 1of 7

CSIM - The consolidated security

intelligence methodology
Scarpinati Luigi
anticip
lsc@anticip.co

June 7, 2018
Abstract

This paper is an attempt to summarize and make a creative effort to define a structured method for cyber
intelligence and threat hunting. The business of cyber intelligence is risky and costly. So in this article, we
will try to define a clear and comprehensive methodology to better respond to the multiple challenges the
cyber intel professional faces in his everydays job.

I. Introduction II. The challenges of cyber


intelligence
he security intelligence discipline is cur-

T rently at the beginning of its way. Orga-


nizations, professionnals and citzens face
the same challenges regarding the protection
Cyber intelligence is tricky. And a good an-
alyst should be able to provide an answer to
an equation where the variable are not clearly
of their assets. known. These variables are multiples in their
With the growing complexity of sysems we forms and complexity and the answers are de-
use everydays, the massive amount of data pending on these parameters.
we exchange and produce and the digitaliza- The activities of an analyst are diverses by
tion of every economic parts of our lives the nature and the risk is great for him to sink in
opportunities for attackers are exploding. In the ocean of informations he has to analyze,
the meantime, the complexity of the task for classify and prioritize in order to uncover the
defenders is rising up. real threats that hurts the entity he tries to
These are some reasons why cyber intel- defend.
ligence is taking more and more place in
In summary, here are some challenges a cy-
every organization’s cyber-defense strategy.
ber intelligence analyst face:
But if there exists some great emerging tools
and frameworks to research for incidents and
threats, we need a global tool to help the ana- • Being burried under the big amount of
lyst or any other concerned party structure his data he has to analyze
cyber intelligence effort in a way that this ef- • define the right attacker for the right threat
fort can be analyzed, structurized and reported • find the capabilities of the attacker
with consistency. • uncover the real target of an attack
Inpired by recognized great tools and frame- • prioritize the threats
works already existing int the cyber intelli- • report the threats consistently
gence field, this article wil try to provide such • design, structure the right responses rec-
a tool. ommendations for a given threat

1
CSIM • Scarpinati Luigi • June7, 2018

III. The diamond model IV. Looking for Capabilities &


infrastructure
One of the common used tool in threat modeli-
sation and cyber intelligence gathering is the Let’s start with an hypothesis. Random J.
diamond model. The good part of this frame- Hacker works for a customer, his mission is
work rely on its ability to observe a threat in to reports threats the customer’s organization
four differents points of view: is suffering. His first statement is: the customer
faces attacks. It is simple as that.
• Victim Next, if the customer faces attacks, there
• Infrastructure should be attackers with some capabilities to
• Capability spread the attack. So if they have some capabil-
• Adversary ities, they should have left some traces proving
these capabilities. Quickly a question raise in
These four point of views influence each oth- Random J. Hacker’s mind: which traces should
ers and lead the analyst to a quite good and I search for? Which tool can help me uncover
actionable analysis. the capabilities attackers use?
The four differents views are like the four
angles of a diamond linked together by edges
that describe the relationship between them. i. The pyramid of pain
One tool who can help our hunter is “the pyra-
mid of pain” as represented below.

One of the strength of this model is that


it makes the analyst aware of the four main
components of a threats. This model formalize,
in some sort, the definition of a threat. This This tool has the goal to help the analyst clas-
sounds like a natural way of designing a threat. sify the different types of intel about attackers’
Without a victim, there is no threat and there capabilities and infrastructures assets.
is no threat without an adversary. In the same This tool classify attackers’ assets from the
way, if there is a threat, there should be an bottom of the pyramid, the most easy assets
adversary that uses his capability to attack an to uncover but also the assets requiring low
infrastructure. efforts for an attacker to gain or hide, to the
But, as stated in the technical paper discrib- top where assets are more difficult to uncover
ing this method, the diamond model is uncom- but also the most valuables for the analyst.
plete. This is a model that can be enriched When considering the yramid of pain it ap-
and somehow used as a backbone for a more pears that if we consider this tool for uncover-
consistent model. ing attacker’s capabilities, we should alo talk
That is the purpose of this article. Using about infrastructure.
the diamond model as a backbone and enrich Let’s consider an example. During his in-
it with tools to go deeper in threat analysis, vestigations, an analyst found a malware hash
measures and classify information, formalize posted on a specialized website. In the pyra-
and standardize threat hunting. mid of pain, the hash is an evidence, the easiest

2
CSIM • Scarpinati Luigi • June7, 2018

asset to detect. It is also the asset causing the Capability Infrastructure


mowest pain to an attacker. In fact, changing The attacker got access The company’s host
the code of his malware will change the hash. to a company’s host that hosts the
The atacker should only change obfuscation, malware
or wathever else and that’s it. Target specific emails The malware
addresses
But, which information the analyst should
Using a specific tactic
get out of this asset? Well if the analyst has a
reverse enginnering report for this malware, he Now, let’s consider the pyraid of pain. We
can get much more informations. already stated that the pyramid is a ranking
Maybe this malware target some specific from the easiest to the most difficult. So let’s
email addresses in he company. Maybe it attribute a quotation to each rank.
makes some TCP connections to sepcifics hosts
in the company’s infrastructure. These repre-
sents capabilities but also infrastructures. An-
other point of consideration in this case could
be:where is stored the malware?
Let’s imagine the analyst uncover that the
malware is stored on a host in the company’s
infrastructure. Here we have another two infor- In our example, we should have the followon-
mations: (a) the attacker has the capability to ing ranking:
hide a malware on the victim’s infrastructure Capability & Infra Ranking
and (b) the attacker’s infrastructure includes a The company’s host 4/6
part of the victim’s infrastructure. that hosts the malware
Target specific emails 6/6
With these informations in mind, let’s imag- addresses
ine that the malware target some specific email Using a specific tactic 6/6
addresses. Another question here could be: The malware hash 1/6
who is targeted? If the malware target some The total is 17/24 or if we ponderate this
email addresses that belong to members of the wheight on ten : 7.09. This give us a useful
company’s direction board, the analyst can de- indicator about the attacker’s capabilities.
duce that the attack is an attempt to get quickly Note that we can also here add CVE/CVSS
access to hosts that play a key role in the com- score if we have an insight about a vulnerability
pany’s infrastructure. that was or could be exoploited. This cold be a
In this case some other few questions could good addition to our ranking and would be a
emerge: Which role plays the host where the precious information hen we will try to define
malware was found in the company’s infras- our attaker persona.
tructure? How the attacker could get access to Here it is interesting to notice, like the dia-
this host? mond model state, that there exists a strong
relationship between capability and infrastruc-
Let’s summarize the findings of our analyst ture. This is a natural way of thinking because
and find a way to value these informations the capabilities of an attacker highly depend on
using our pyramid of pain. the attacker’s capacity to set up, maintain and
First, let’s classify informations: use an infrastructure to perform his malicious
activities.
At this point, in the context of this security
event, we have a good understanding of the at-
taker’s capabilities but what about the attacker

3
CSIM • Scarpinati Luigi • June7, 2018

himself? This lead us to the attacker point of


view. Class Description
APTs Highly trained
and highly financial
V. Who is behind the curtain? supported adversary.
Use special techniques
The capability of the attacker can give us a and zero day exploits.
quite good understanding of its personnality Dispose of time and
and its motivations. resources. Difficult to
Let’s consider our previous example. We find intel about their
saw that the attacker could store a malware on activities.
one of the hosts that belongs to the victim. We Cyber Highly qualified and
also noticed that the attacker targeted specific criminals motivated adversary
emails belonging to key persons in the com- Disposes of resources
pany. But how to figure out wich attacker we but has time contraint.
face? Less verbose about
To help us in this task let’s categorize com- his targets
monly acepted attacker types. To achieve that and activities.
goal, we can take inspiration from the military Cyber Adversary motivated by
field of activities. espionage gain and/or strategic and/or
In intel military, operators have the habit to financial advantage.
classify adversaries according to different crite- External to the victim.
rias ( motivation, training, experience, . . . ). For Variable in qualification,
example when intel operatives face terrorism variable in financial support.
threat for example, they quickly try to know Insider Attacker internal to the victim.
which is the level of training and which are the Variable in his motivations,
weapons the attacker can use. This give them variable in his training,
an insight about which class of adversary they difficult to prevent.
face. Hacktivist Attacker motivated by political,
We easely can apply the same concept to religious or other causes.
malicious cyber actors. In the matrice below Variable in financial support.
you can see a matrice classifiying the most Variables in qualification.
accepted types of malicious actors. Verbose about his activities.
Use automated tools.
Script Attacker poor in technical skills
kiddies Practically not financial supported.
Uses automated tools.
Without any motivation.

One pitfall here should be to leave this clas-


sification as it is. But, using entities names in
classes is not a good idea. The classes represent
types of attacker with capabilities, motivations,
funding, . . . that is why the better alternative
would be to name class of attackers “class 1”,
“class 2”, . . .
So a good classification of attackers should
be:

4
CSIM • Scarpinati Luigi • June7, 2018

Class Description If we consider the adversary matrice, we are


1 Highly trained most likely facing an attackertype between an
and highly financial insider and an hacktivist. In our example, we
supported adversary. have no reason to beleive this conclusion.
Use special techniques Remember, the found malware targeted spe-
and zero day exploits. cific emails addresses and was found in the
Dispose of time and victim’s infrastructure. This was more likely a
resources. Difficult to more sophisticated kind of threat than a hack-
find intel about their tivist or an insider would perform.
activities. But what about considering that the class
2 Highly qualified and number of the potential attacker is inversely
motivated adversary related with the capability score? In this case,
Disposes of resources the formula should be:
but has time contraint.
7.09 1.75
Less verbose about C= = (1 − 0.709) ∗ 6 =
his targets 10 6
and activities. In this case, we are most likely somewhere
3 Adversary motivated by in between the “APTs” class and the “cyber-
gain and/or strategic and/or criminals” class but nearest the second one.
financial advantage. This gives us a quite good judgement about
External to the victim. our attacker’s type.
Variable in qualification, We can here draw the conclusion that as the
variable in financial support. capability score of an attacker increase, the
4 Attacker internal to the victim. attacker class number decrease. More globally,
Variable in his motivations, the formula should be as follow:
variable in his training,
difficult to prevent. Let A the attacker
5 Attacker motivated by political, Let S the capability score
religious or other causes. Let C the attacker class
Variable in financial support.
Variables in qualification. a x
Verbose about his activities. ∀A where S = exists C = such that
b y
Use automated tools. 1−S
6 Attacker poor in technical skills C=
y
Practically not financial supported.
Uses automated tools. This way, we can define the attacker’s class
Without any motivation. with more confidence.
We have now a classification where one is
the most efficient type of attacker and six the VI. What about the victim?
easiest type of attacker. If we consider the
score we had in our previous example (7.09/10) So we defined the attacker’s capability score,
we can try to find a method to determine the the attacker’s class rank and now another ques-
attacker type. tion shows up: How to quantify the vctim’s
We have six classes of attacker. We could readiness to face this threat? How to rank and
easely deduce the following formula to deter- evaluate the impact this threat has on the vic-
mine the attacker’s class “C”: tim?
7.09 4.25 In this part of the analyze, two things should
C= = 0.709 ∗ 6 = be considered: the victim and the attack the
10 6

5
CSIM • Scarpinati Luigi • June7, 2018

victim faces. So there should be some indi- ploitation.


cators helping us determining the impact the And (2) second, the concept exist (documen-
analyzed security event on the victim. tation states that the vulnerability exists) but
One of the tools that can help is known as ther is no proof that the vulnerability was ex-
the “Cyber Kill Chain”. This tool describe an ploited. In this case it would be normal to rank
attack at different stages. The image below this poential threat as “conceptualization”.
explain these different steps of an attack: In our example, the malware targeted spe-
cific email addresses. So we can consider that
the attack is at a delivery stage. Therefore, we
should rank it in the “delivery” stage giving
the threat a score of 3/7.
But there is another parameter that will influ-
ence the impact of a threat on the victim: the
maturity of the victim regarding its security
intelligence plans and procedures.
A victim that has practically no plan about
threat intelligence planning and security mon-
itoring, will be more impacted because of its
lack of security planning, adaptation and in-
cident response planning. This factor can in-
crease or decrease the level of the impact on
the victim.
This is a variable an analyst should consider
in his investigations. To help in this task, let’s
categorize the different types of victims regard-
ing their threat intelligence plannification.

Let’s imagine we pointed a potential threat


based on a known vulnerability in a software
the victim uses and we do not know if an at-
tacker already used it to attack the victim. How
should we rank the attack following the cyber
kill chain?
Well, there are two possibilities. (1) There
exist some documentation proving that this
vulnerability is exploitable and in tis case the
risk is that someone exploit the vulnerability.
So a good practice would be to rank it as ex- The graph above is clear, it permits to con-

6
CSIM • Scarpinati Luigi • June7, 2018

sider the maturity of the victim in our threat VIII. Conclusion


ranking. This way, an anlayst can keep trace
of the past event ranked and can make time For an analyst, ranking, comparing and keep-
based comparaisons between security events. ing track records of cyber threats is a real chal-
This will help the analyst and the organization lenge. In this article we tried to formalize this
keep track of the progress the victim made. process. This model is maybe not perfect but
time and practice will help this process en-
hance.
VII. Putting it all together A security intelligence process genarate a
Now, we have a threat and we defined: an huge amount of data and informations to an-
attacker capabilities score, an attacker class, alyze. Ranking is a key point as it permit to
an attack’s stage score and a victim’s maturity quickly compare security, prioritize and ratio-
score. We can put all these quotations together nalize the security efforts.
to et our threat score.
In our example, let’s consider that the victim References
has not planned activities in threat intelligence.
The organization relies on automated tools to [Jon Friedman, Mark Bouchard 2015] Jon
ensure its security. There is a monitoring imple- Friedman, Mark Bouchard (2015). Defini-
mented but the position is quite passive. The tive Guide to Cyber Threat Intelligence
victim wait and see for compromise. So we CyberEdge Group, LLC.
have the following scores:
[S. Caltagirone,A. Pendergast,C. Betz 2013]
Description Score Sergio Caltagirone,Andrew Pender-
Attacker Capability 7.09/10 gast,Christopher Betz (2013). The
Attacker Class 1.75/6 Diamond Model of Intrusion Analysis US
Attack Stage 3/7 Department of Defense.
Victim Maturity 5/5
We now have a threat score of 16.84/28 or [J. A. Gomez 2011] Jimmy A. Gomez (2011).
6.01/10. This represent a serious threat. The The Targeting Process: D3A and F3EAD
evaluation seems to be correct because, as we 2011, Small Wars Foundation.
have a targeted attack, we only have the proof
that the attack was delivered. But as we does
not have the proof that there was an exploita-
tion based on this attack we can not have a
higher score.
Here, the interesting thing is that with this
methodology, we can adapt the score of a
threat. Let’s imagine that further investiga-
tion proof that the victim was exploited ad that
there are indications of a C2 activity. Now the
threat score should be adapted as follow:
Description Score
Attacker Capability 7.09/10
Attacker Class 1.75/6
Attack Stage 6/7
Victim Maturity 5/5
The threat score is now : 19.84/28 or 7.09/10.
This is clear that the attack is getting more
serious.

You might also like