Security Toolbox Forensics & Analysis Resources 27 - itnett/FTD02H-N GitHub Wiki
Here’s a comprehensive list of tools mapped to various stages of the MITRE ATT&CK framework. This mapping shows how different tools can be used throughout an investigation for each technique identified in the framework.
1. Initial Access (TA0001)
-
Exploitation of Public-Facing Applications (T1190):
- Tool: Nmap (Scanning for vulnerabilities on public-facing applications)
- Link: Nmap
- Tool: Burp Suite (Testing and exploiting web vulnerabilities)
- Link: Burp Suite
- Tool: Nmap (Scanning for vulnerabilities on public-facing applications)
-
Drive-by Compromise (T1189):
- Tool: ZAP (Web vulnerability scanner)
- Link: OWASP ZAP
- Tool: ZAP (Web vulnerability scanner)
2. Execution (TA0002)
-
Command and Scripting Interpreter (T1059):
- Tool: PowerShell Empire (Post-exploitation tool for Windows scripting and control)
- Link: PowerShell Empire
- Tool: Metasploit (Command execution and exploitation framework)
- Link: Metasploit
- Tool: PowerShell Empire (Post-exploitation tool for Windows scripting and control)
-
Exploitation for Client Execution (T1203):
- Tool: Exploit Pack (Exploit vulnerability discovery and weaponization)
- Link: Exploit Pack
- Tool: Exploit Pack (Exploit vulnerability discovery and weaponization)
3. Persistence (TA0003)
-
Account Manipulation (T1098):
- Tool: BloodHound (Active Directory account manipulation mapping)
- Link: BloodHound
- Tool: Mimikatz (Credential and token extraction for persistence)
- Link: Mimikatz
- Tool: BloodHound (Active Directory account manipulation mapping)
-
Boot or Logon Autostart Execution (T1547):
- Tool: Autoruns (Windows persistence via autostart programs and scripts)
- Link: Autoruns
- Tool: Autoruns (Windows persistence via autostart programs and scripts)
4. Privilege Escalation (TA0004)
-
Exploitation for Privilege Escalation (T1068):
- Tool: WinPwnage (Privilege escalation tool targeting Windows)
- Link: WinPwnage
- Tool: WinPwnage (Privilege escalation tool targeting Windows)
-
Access Token Manipulation (T1134):
- Tool: Incognito (Access token manipulation in Windows)
- Link: Incognito
- Tool: Incognito (Access token manipulation in Windows)
5. Defense Evasion (TA0005)
-
Obfuscated Files or Information (T1027):
-
Indicator Removal on Host (T1070):
- Tool: CCleaner (Clearing logs and temporary files)
- Link: CCleaner
- Tool: LogCleaner (Remove log artifacts on Windows and Linux)
- Link: LogCleaner
- Tool: CCleaner (Clearing logs and temporary files)
6. Credential Access (TA0006)
-
Credential Dumping (T1003):
-
Brute Force (T1110):
- Tool: Hydra (Password brute forcing)
- Link: Hydra
- Tool: Hydra (Password brute forcing)
7. Discovery (TA0007)
-
Network Service Scanning (T1046):
-
System Information Discovery (T1082):
- Tool: SystemInfo (Collect system details in Windows)
- Link: Built-in Windows tool
- Tool: OSQuery (SQL-powered endpoint visibility)
- Link: OSQuery
- Tool: SystemInfo (Collect system details in Windows)
8. Lateral Movement (TA0008)
-
Remote Services (T1021):
- Tool: PsExec (Remote service execution)
- Link: PsExec
- Tool: CrackMapExec (Lateral movement within Windows networks)
- Link: CrackMapExec
- Tool: PsExec (Remote service execution)
-
Exploitation of Remote Services (T1210):
- Tool: Metasploit (Exploiting services)
- Link: Metasploit
- Tool: Metasploit (Exploiting services)
9. Collection (TA0009)
- Data Staged (T1074):
10. Command and Control (TA0011)
-
Application Layer Protocol (T1071):
- Tool: Cobalt Strike (Red team C2 framework)
- Link: Cobalt Strike
- Tool: Empire (C2 framework for post-exploitation)
- Link: Empire
- Tool: Cobalt Strike (Red team C2 framework)
-
Non-Standard Port (T1571):
- Tool: Suricata (Intrusion detection for unusual port usage)
- Link: Suricata
- Tool: Suricata (Intrusion detection for unusual port usage)
11. Exfiltration (TA0010)
-
Automated Exfiltration (T1020):
- Tool: rclone (File transfer automation)
- Link: rclone
- Tool: rclone (File transfer automation)
-
Data Compressed (T1002):
- Tool: 7-Zip (File compression before exfiltration)
- Link: 7-Zip
- Tool: 7-Zip (File compression before exfiltration)
12. Impact (TA0040)
-
Data Encrypted for Impact (T1486):
- Tool: GPG (Encrypting files to disrupt access)
- Link: GPG
- Tool: GPG (Encrypting files to disrupt access)
-
Service Stop (T1489):
- Tool: SC (Service Control) (Stop Windows services for disruption)
- Link: Built-in Windows tool
- Tool: KillDisk (Wipe and disable services for disruption)
- Link: KillDisk
- Tool: SC (Service Control) (Stop Windows services for disruption)
Additional Tools
- Threat Intelligence and Detection:
Forensic and Incident Response Tools
-
Memory Forensics (T1003, T1046, T1071)
- Tool: Volatility (Memory forensics framework)
- Link: Volatility
- Tool: Rekall (Memory forensics framework)
- Link: Rekall
- Tool: Volatility (Memory forensics framework)
-
Disk Forensics (T1070)
- Tool: The Sleuth Kit (TSK) (Low-level forensic analysis)
- Link: The Sleuth Kit
- Tool: Autopsy (GUI for The Sleuth Kit, used for disk forensic analysis)
- Link: Autopsy
- Tool: The Sleuth Kit (TSK) (Low-level forensic analysis)
-
Live Response (T1070, T1105)
- Tool: GRR Rapid Response (Live forensics and incident response)
- Link: GRR Rapid Response
- Tool: Velociraptor (Endpoint visibility and live response)
- Link: Velociraptor
- Tool: GRR Rapid Response (Live forensics and incident response)
Digital Artifact Collection and Evidence Preservation
- Artifact Collection (T1003, T1070, T1105)
- Tool: Log2Timeline (plaso) (Creating forensic timelines from digital evidence)
- Link: plaso
- Tool: Bulk Extractor (Forensic tool that scans disks and images for digital artifacts)
- Link: Bulk Extractor
- Tool: Log2Timeline (plaso) (Creating forensic timelines from digital evidence)
Network Forensics
-
Network Traffic Analysis (T1040)
-
Protocol Analysis (T1071.001)
Malware Analysis
-
Static Malware Analysis (T1071, T1105)
-
Dynamic Malware Analysis (T1105)
- Tool: Cuckoo Sandbox (Automated malware analysis in sandbox environments)
- Link: Cuckoo Sandbox
- Tool: Hybrid Analysis (Online service for dynamic malware analysis)
- Link: Hybrid Analysis
- Tool: Cuckoo Sandbox (Automated malware analysis in sandbox environments)
Web and URL Analysis
-
URL Reputation Checking (T1071)
- Tool: VirusTotal (Multi-engine URL and file reputation service)
- Link: VirusTotal
- Tool: URLHaus (Check for known malicious URLs)
- Link: URLHaus
- Tool: VirusTotal (Multi-engine URL and file reputation service)
-
Webpage Snapshot and Inspection (T1071.001)
- Tool: URL2PNG (Take a snapshot of a webpage for analysis)
- Link: URL2PNG
- Tool: Wayback Machine (Check for historical versions of a website)
- Link: Wayback Machine
- Tool: URL2PNG (Take a snapshot of a webpage for analysis)
Threat Intelligence Sharing and Collaboration
- Threat Intelligence Platforms (T1071.001)
Exfiltration and Data Loss Prevention (DLP)
-
File Monitoring and Detection (T1074)
-
Data Compression Detection (T1002)
- Tool: 7-Zip (Used for file compression, often by attackers)
- Link: 7-Zip
- Tool: 7-Zip (Used for file compression, often by attackers)
Case Workflow Example Using These Tools:
-
Detection: Network anomalies are flagged by Suricata or Zeek, indicating possible exfiltration attempts or command-and-control communication on non-standard ports (MITRE ATT&CK T1571). URLs and IP addresses are captured for further investigation.
-
URL/Domain Investigation: The URLs and IPs are analyzed in VirusTotal and URLHaus to check if they are associated with known malware campaigns (MITRE ATT&CK T1071).
-
Webpage Analysis: URL2PNG or Wayback Machine are used to gather snapshots of the page at different times to understand if the site has been compromised (MITRE ATT&CK T1071.001).
-
Malware Analysis: If the site is distributing a malicious binary, it can be submitted to Hybrid Analysis or Cuckoo Sandbox to get a dynamic behavior analysis and see how it interacts with the operating system (MITRE ATT&CK T1105).
-
Network Inspection: Wireshark or Tcpdump can capture and inspect network traffic to see how the malware communicates with the C2 server (MITRE ATT&CK T1071).
-
Memory and Disk Forensics: Volatility or Autopsy are used to analyze memory dumps and disk images for residual artifacts (MITRE ATT&CK T1070).
-
Threat Intelligence: Any new indicators (IPs, hashes, domains) are shared in MISP or OTX for the broader community to be aware of the new threat (MITRE ATT&CK T1020).
By mapping these tools to each MITRE ATT&CK tactic and technique, you ensure a structured, comprehensive approach to identifying and mitigating cyber threats across various phases of an attack.