FYP
a simple guide on how to use the threat hunting tool
Guide
According to MITRE ATT&CK Frameworks, there are a lot of TTP can be used by attacker.
Below are the description and what to search for.
Reconnaissance - TA0043
T1595.001
Name: Scanning IP blocks
Description: Attacker scanning victim's IP block to gather network information.
Data Source: Access Log
Keyword: nmap
T1595.002
Name: Vulnerability Scanning
Description: Attacker may scan victim for known or unknown vulnerability to exploit
Data Source: Access Log
Keyword: nmap
T1595.003
Name: Wordlist Scanning
Description: Attacker may use brute forcing or crawling technique to understand the victim's infrastructure
Data Source: Access Log
Keyword: gobuster, dirbuster
Initial Access - TA0001
T1133
Name: External Remote Services
Description: Adversaries may leverage external-facing remote services to initially access and/or persist within a network
Data Source: Auth Log
Keyword: ssh, sshd
Reference: https://attack.mitre.org/techniques/T1133/
Valid Accounts - T1078
T1078.003
Name: Local Accounts
Description: Adversaries may obtain and abuse credentials of a local account
Data Source: Auth Log
Keyword: failed, Failed, Accept, Accepted, accept, accepted
Reference: https://attack.mitre.org/techniques/T1078/
Execution - TA0002
Command and Scripting Interpreter - T1059
T1059.004
Name: Unix Shell
Description: Adversaries may abuse Unix shell commands and scripts for execution
Data Source: Auth Log
Keyword: COMMAND
Data Source: Command History
Keyword: <anything>
Scheduled Task/Job - T1053
T1053.003
Name: Cron
Description: Adversaries may abuse the cron utility to perform task scheduling for initial or recurring execution of malicious code
Data Source: Auth Log, Syslog
Keyword: CRON
Persistence - TA0003
Create Account - T1136
T1136.001
Name: Local Account
Description: Adversaries may create a local account to maintain access to victim systems
Data Source: Auth Log
Keyword: useradd, usermod
Privilege Escalation - TA0004
Abuse Elevation Control Mechanism - T1548
T1548.003
Name: Sudo and Sudo Caching
Description: Adversaries may perform sudo caching and/or use the sudoers file to elevate privileges
Data Source: Auth Log
Keyword: sudo
Credential Access - TA0006
Brute Force - T1110
T1110.001, T1110.002, T1110.003, T1110.004
Name: Password Guessing, Password Cracking, Password Spraying, Credential Stuffing
Description: Adversaries may use brute force techniques to gain access to accounts when passwords are unknown or when password hashes are obtained
Data Source: Auth Log
Keyword: Failed password, password
Reference: https://attack.mitre.org/techniques/T1110/
Last updated