MITRE ATT&CK Framework

Introduction to MITRE Lesson:

Question 1:


Read the information provided from LetsDefend for answer.

Introduction to MITRE Lesson:

Question 2:


Read the information provided from LetsDefend for answer.

Answer Question 1

1958 

Answer Question 2

2013

Matrix Lesson:

Question 1:


Not a fan of this question. A better question would be what is the name of the format that the tactics and techniques are displayed in? or open the framework at MITRE ATT&CK framework and fill in the blank below.

ATT&CK ______ for Enterprise?


Matrix Lesson:

Question 2:


Read the information provided from LetsDefend for answer. Options are Mobile, ICS, Enterprise.

Matrix Lesson:

Question 3:


Not a fan of this question. A better question would be what is the name of the format that the tactics and techniques are displayed in? or open the framework at MITRE ATT&CK framework and fill in the blank below.

ATT&CK ______ for Enterprise?


Answer Question 1

Matrix 

Answer Question 2

Enterprise 

Answer Question 3

Mobile 

Tactics Lesson:

Question 1:


Step 1: Open the enterprise Matrix at MITRE ATT&CK framework

Step 2: Hover over the “Lateral Movement” tactic label and note the answer.


Tactics Lesson:

Question 2:


Step 1: Open the enterprise Matrix at MITRE ATT&CK framework

Step 2: Switch to “Mobile” matrices under the “Matrices” tab across the top of the webpage.

Step 3: Hover over the “Persistence” tactic column label and click it.

Step 4: Note the created date in the upper right of the web page for the answer.


Tactics Lesson:

Question 3:


Step 1: Open the enterprise Matrix at MITRE ATT&CK framework.

Step 2: Select “Enterprise” on the “tactics” tab at the top of the webpage.

Step 3: Read through the descriptions of the tactics to find the one that matches the question and note the tactic name for teh answer.


Answer Question 1

TA0008 

Answer Question 2

17 October 2018 

Answer Question 3

Privilege Escalation 

Techniques and Sub-Techniques Lesson:

Question 1:


Step 1: Open the enterprise Matrix at MITRE ATT&CK framework.

Step 2: Select “Enterprise” on the “techniques” tab at the top of the webpage.

Step 3: Search this page for the “T1055” ID name. My suggestion would be to use CTRL-F for this.


Techniques and Sub-Techniques Lesson:

Question 2:


Step 1: Open the enterprise Matrix at MITRE ATT&CK framework.

Step 2: Select “Enterprise” on the “techniques” tab at the top of the webpage.

Step 3: Search this page for the “T1112” ID name. My suggestion would be to use CTRL+F for this.

Step 4: Click on the “T1112” label to be taken to more information on that technique.

Step 5: Note the “Platforms” in the upper right for the answer.


Techniques and Sub-Techniques Lesson:

Question 3:


Step 1: Open the enterprise Matrix at MITRE ATT&CK framework.

Step 2: Search for the “Supply Chain Compromise” within all the techniques listed on this page. Once found look at the column label for the answer. My suggestion would be to use CTRL+F for searching for this.


Answer Question 1

Process Injection 

Answer Question 2

Windows

Answer Question 3

Inital Access

Mitigations Lesson:

Question 1:


Step 1: Open the enterprise Matrix at MITRE ATT&CK framework.

Step 2: Select “Mitigations” on the “Defenses” tab at the top of the webpage. Then select “Enterprise” from the options.

Step 3: Search for the “M1032” within all the mitigations listed on this page. Once found look at the name to the right for the answer. My suggestion would be to use CTRL+F for searching for this.


Mitigations Lesson:

Question 2:


This question seems a little outdated since the quote from the above question is not exactly the same anymore.

Step 1: Open the enterprise Matrix at MITRE ATT&CK framework.

Step 2: Select “Mitigations” on the “Defenses” tab at the top of the webpage. Then select “Enterprise” from the options.

Step 3: Search for the “Digital Signature Verification” within all the mitigations listed on this page. Once found look at the name to the left for the answer. My suggestion would be to use CTRL+F for searching for this.


Answer Question 1

Multi-factor Authentication 

Answer Question 2

Code Signing 

Groups Lesson:

Question 1:


Step 1: Open the enterprise Matrix at MITRE ATT&CK framework.

Step 2: Select “Groups” under the “CTI” tab at the top of the webpage.

Step 3: Search all groups for the APT named “Oilrig”. CTRL + F

Step 4: Click on the Oilrig name to within the left side panel to be taken to their information page.

Step 5: Search the page for “System Information Discovery” . CTRL + F

Step 6: One of the two commands on the right is the answer. Notice that the question states “associated only with the system information”.


Groups Lesson:

Question 2:


Step 1: Open the enterprise Matrix at MITRE ATT&CK framework.

Step 2: Select “Groups” under the “CTI” tab at the top of the webpage.

Step 3: Search all groups for the APT named “GOLD NIAGARA”. CTRL + F

Step 4: Make sure the search result also has “ITG14” and “Carbon Spider” listed within the associated groups. The answer is the name of the group to the left.


Answer Question 1

Systeminfo 

Answer Question 2

FIN7 

Software Lesson:

Question 1:


Step 1: Open the enterprise Matrix at MITRE ATT&CK framework.

Step 2: Select “Software” under the “CTI” tab at the top of the webpage.

Step 3: Search all software for “Cryptoistic” and click on it when found. CTRL + F

Step 4: The answer is in the upper right information. Look for the platform name to the right of “Platforms”


Software Lesson:

Question 2:


Step 1: Open the enterprise Matrix at MITRE ATT&CK framework.

Step 2: Select “Software” under the “CTI” tab at the top of the webpage.

Step 3: Search all software for “Rotexy” and click on it when found. CTRL + F

Step 4: The answer is in the upper right information. Look for the type name to the right of “Type”


Software Lesson:

Question 3:


Step 1: Open the enterprise Matrix at MITRE ATT&CK framework.

Step 2: Select “Software” under the “CTI” tab at the top of the webpage.

Step 3: Search all software for “PUNCHBUGGY”. CTRL + F

Step 4: The answer is in the text to the right.


Answer Question 1

macOS 

Answer Question 2

Malware 

Answer Question 3

FIN8