In this post, we provided a comprehensive explanation of OpenCTI, a cyber threat intelligence platform, to gather cyber threat intelligence and use it to build security controls. We also used TryHackMe Trooper to demonstrate the practical part.
Please watch the video at the bottom for full detailed explanation of the walkthrough.
Blue Team Cyber Security & SOC Analyst Study Notes
TryHackMe Task Description
A multinational technology company has been the target of several cyber attacks in the past few months. The attackers have been successful in stealing sensitive intellectual property and causing disruptions to the company’s operations. A threat advisory report about similar attacks has been shared, and as a CTI analyst, your task is to identify the Tactics, Techniques, and Procedures (TTPs) being used by the Threat group and gather as much information as possible about their identity and motive. For this task, you will utilise the OpenCTI platform as well as the MITRE ATT&CK navigator, linked to the details below.
Introduction to Cyber Threat Intelligence (CTI)
CTI refers to collecting, managing, and sharing threat intelligence data, which is crucial for identifying and mitigating cybersecurity threats.
Platforms like OpenCTI, MISP (Malware Information Sharing Platform), and The Hive are used to store and manage threat data gathered from incident responses and community feeds.
Sources of Threat Intelligence
Incident Response Engagements: Data from incident response teams includes information such as malware, indicators of compromise (IOCs) like hashes, IPs, domains, etc.
Community Feeds: Sharing threat data across organizations provides a broader view of emerging cyber threats.
Components of OpenCTI
Dashboard: Summarizes all collected threat intelligence, including reports, entities, and observables (e.g., domains and IPs).
Activities Tab: Contains threat intelligence reports from various organizations, detailing recent threats and events. Local incident data is registered here.
Knowledge Tab: Includes detailed information on threat actors, their tools, techniques, and procedures (TTPs). It also categorizes threats using frameworks like MITRE ATT&CK.
USB-Ferry Attack Analysis with OpenCTI
The USB-Ferry malware is described in a cyber attack scenario, where the malware is propagated using USB devices to infect air-gapped networks (those isolated from the internet for security reasons).
The attack targets critical sectors, including healthcare, military, and transportation in regions like Taiwan, the Philippines, and Hong Kong.
By using OpenCTI and MITRE Navigator, analysts can investigate attacks, identify attacker groups (such as Tropic Trooper), and analyze their tactics and tools.
The malware USB-Ferry is delivered initially via spear-phishing emails, then spreads to air-gapped systems via infected USBs.
Investigators can search for related malware, tools, and vulnerabilities within OpenCTI to conduct a thorough analysis of the cyber attack.
Understanding Attack Pattern
OpenCTI allows the analysis of attack patterns, such as how Tropic Trooper uses various techniques like spear-phishing and USB propagation for initial access to systems.
Analysts can dive deeper into specific malware, such as Yahya and USB-Ferry, and see the associated attack patterns and defensive strategies.
Room Answers | TryHackMe Trooper
What kind of phishing campaign does APT X use as part of their TTPs?
spear-phishing emails
What is the name of the malware used by APT X?
USBferry
What is the malware’s STIX ID?
malware–5d0ea014-1ce9-5d5c-bcc7-f625a07907d0c
With the use of a USB, what technique did APT X use for initial access?
Replication through removable media
What is the identity of APT X?
Tropic Trooper
On OpenCTI, how many Attack Pattern techniques are associated with the APT?
39c
What is the name of the tool linked to the APT?
BITSAdmin
Load up the Navigator. What is the sub-technique used by the APT under Valid Accounts?
Local Accounts
Under what Tactics does the technique above fall?
Initial Access, Persistence, Defense Evasion and Privilege Escalation
What technique is the group known for using under the tactic Collection?
Automated Collection
Video Walkthrough