DeTT&CT aims to assist blue teams using ATT&CK to score and compare data log source quality, visibility coverage, detection coverage, and threat actor behaviors. All of which can help, in different ways, to get more resilient against attacks targeting your organization. The DeTT&CT framework consists of a Python tool, YAML administration files and scoring tables for the different aspects.
DeTT&CT provides the following functionality:
- Administrate and score the quality of your data sources.
- Get insight on the visibility you have on for example endpoints.
- Map your detection coverage.
- Map threat actor behaviors.
- Compare visibility, detections and threat actor behaviors to uncover possible improvements in detection and visibility. This can help you to prioritize your blue teaming efforts.
The colored visualizations are created with the help of MITRE’s ATT&CK™ Navigator.
The Cyber Threat Intelligence Repository of MITRE ATT&CK™ contains loads of valuable information on:
- TTPs (Tactics, Techniques and Procedures)
- Groups (threat actors)
- Software (software used by threat actors)
- Data sources (visibility required for detection)
The relationship between these types of information can be visualized using the following diagram:
You can map the information you have within your organization on the entities available in ATT&CK. DeTT&CT delivers a framework which does exactly that, and it will help you to administrate your blue team’s data sources (including data quality), visibility and detection. It will also provide you with means to administrate threat intelligence that you get from your intelligence team or a third-party provider. This can then also be compared to your current detection or visibility coverage.
DeTT&CT administrates all this information within different YAML files, and a scoring table is provided to have a standardized way of scoring your data quality, visibility, and detection. A Python tool is used (dettect.py) to generate all kind of output:
- ATT&CK Navigator layer files
- Excel files
For example, DeTT&CT can generate a layer file for the ATT&CK Navigator, which shows you your visibility and detection coverage, or techniques and software used by certain threat actors.
- It is now possible to perform an EQL search on custom key-value pairs of a technique administration YAML file.
- Added new functionality to support a platform key-value pair in a group YAML file.
- Added a new feature to the data source menu to include all ATT&CK techniques in the generated YAML file (when the argument -y, –yaml is provided) that apply to the platform(s) specified in the data source YAML file:
- Revoked ATT&CK STIX objects are now removed from the results that are retrieved from the ATT&CK TAXII server.
- Added new functionality to make sure the metadata in a Navigator layer file is compliant with the expected data structure.
- Upgraded all used Python packages to their latest version.
- Several other small improvements.
- Health checks:
- Added a check for when the data source YAML administration file is missing one of the ATT&CK data sources.
- Added a check for an empty item in the key-value pair ‘location’ (in a detection) and ‘applicable_to’.
- Bug fixes:
- A bug that could result in an invalid message in the Excel for a missing ATT&CK data source.
- An Excel export for a technique administration YAML file would cause a crash when having an empty/None value for a detection or visibility comment. Reported by @sreeman.
- Within specific circumstances a wrong colour for visibility was used when detection coverage is overlaid with visibility. Reported by @sreeman.
The post DeTTECT v1.2.6 releases: Detect Tactics, Techniques & Combat Threats appeared first on Penetration Testing.