“Intelligence-Driven Incident Response” Notes
Intelligence-Driven Incident Response: Outwitting the Adversary, Second Edition by Rebekah Brown and Scott J. Roberts is a helpful, informative guide to the theory and practice of cyber threat intelligence (CTI), giving practical steps for running integrated, complementary CTI and incident response (IR) ops. Much of the book walks through the F3EAD model (a combination of the incident response and intel cycles).
My notes follow.
This page contains one or more affiliate links. As an Amazon Associate, I earn from qualifying purchases.
Introduction
To aid decision-making, don’t just give data; tell a story.
Basics of Intelligence
IoCs can be used to detect threats on network and aid post-incident analysis & strategic research.
Use OODA loop to make quick decisions. Use intel cycle to generate more formal intel products.
OODA loop
- Observe: collect info (gather logs, monitor systems, collect outside info).
- Orient: put info into context with known info about network, threat actors, IoCs, requirements, mission.
- Decide: debate various courses of action (continue to observe attacker, start IR, or ignore activity), then choose 1.
- Act: execute course of action.
Both defender and attacker use OODA loop. Try to slow down attacker loop and speed up defender loop.
Consider how 1 defender team’s decisions affect others (e.g., org publicly sharing info about attack starts clock for defenders in other orgs to use that intel).
Intel Cycle
- Direction: Establish question(s) that intel is to answer.
- Collection: Gather data from external & internal sources. Redundant data is useful for corroboration. Include all threat actor aliases.
- Processing: Make data usable (normalize, index, translate, enrich, filter, prioritize, visualize).
- Analysis: Assess meaning & implication of data to answer question(s). Use analytic models to analyze, assess, predict.
- Dissemination: Share intel with relevant stakeholders, in form they prefer.
- Feedback: Ask stakeholders if intel successfully answered question(s).
Qualities of good intel
- Collection method (how info was collected)
- Date of collection
- Context (activities related to info, relationships between pieces of info, etc.)
- Addresses analytic biases
Intel levels
- Tactical: Low-level, highly perishable info. Includes IOCs, observables, granular TTPs. Customers: SOC analysts, CIRT investigators.
- Operational: More general than tactical, more specific than strategic. Includes info on campaigns; generalized TTPs (campaigns, actions on objective); anticipated adversary responses; actor attribution, capabilities, intent. Customers: senior DFIR analysts, other CTI teams.
- Strategic: Info for making serious decisions about risk assessments, resource allocation, organizational strategy. Includes threat trends, actor motivations, new tactics or targeting. Customers: C-level executives, boards of directors.
Basics of Incident Response
Understanding what’s being targeted gives insight into adversary’s goal, so you can better defend.
Data types
- Hard data: info about technical aspects of network, systems
- Soft data: info about org
Collection methods
- Active: collecting by interacting directly with target
- Passive: collecting info without interacting directly with target (e.g., DNS, WHOIS)
Weaponization: finding vulnerability, crafting exploit, developing payload, testing payload
Actions on Objective
- Destroy: destroy physical or virtual item
- Deny: deny usage of resource
- Degrade: degrade utility of resources or capabilities (usually C2)
- Disrupt: interrupt flow of info
- Deceive: deliver false info
D5 model can also be used for defense.
Each event in Diamond Model can be categorized according to its Kill Chain phase.
Use ATT&CK & D3FEND together to trace from actor to system-hardening steps & detections.
Reasons to not hack back
- Difficult to accurately identify/attribute attacker
- Difficult to respond proportionately
- Serves limited purpose beyond sense of revenge
- Could trigger retaliation
- Illegal in most countries
Active defense: disrupt attacker’s tempo; impose cost; force attacker into making mistake, to expose them
F3EAD cycle
Intel & IR cycles feed into each other in OODA loop; each IR op leads to an intel op, & each intel op leads to an IR op
- Find: determine threat(s) to address (Preparation phase of IR cycle)
- Fix: identify attacker’s presence in network (Identification phase of IR cycle)
- Finish: take action against attacker (Containment, Mitigation, Eradication phase of IR cycle)
- Exploit: gather info about attacker, from each stage of Kill Chain (Collection phase of intel cycle)
- Analyze: develop complete picture of attacker and TTPs, & how to detect, mitigate, remediate (Analysis phase of intel cycle)
- Disseminate: share intel with relevant stakeholders (Dissemination phase of intel cycle)
Find
Find info based on actor, victim, asset, capability, infrastructure, and/or media (news).
Goal: develop info that will be useful during Fix phase. Most useful info is hard-to-change info (high in Pyramid of Pain), especially attacker goals.
Fill in Kill Chain with info known about attacker.
Victim-centric questions
- Why were these victims targeted?
- What commonalities do they share?
- Can actors’ goals or motivations be inferred from victims?
Victim-infrastructure questions
- What was connection between victim & adversary’s infrastructure?
- Did other devices interact with infrastructure in same way as victim?
- Is anything unique about relationship that could be pivoted on?
Victim-capability questions
- What about victim made this capability (un)successful?
- Are other victims susceptible to same capabilities?
Victim-adversary questions
- What would targeting victim help adversary achieve?
- Are there other victims with similar characteristics that may have been targeted?
By understanding who is capable of attacking types of systems you’re protecting, you can focus on indicators & tools that are useful for attacking your systems.
To avoid rabbit holes, stop 2 pivots away from piece of info you know is relevant.
Attribute based on goals, motivations, behaviors, tactics. Don’t attribute based on malware (shared by many groups).
Lead format
- Lead: core observation/idea
- Datetime: when lead was submitted
- Context: how lead was found (internal or external, research or incident)
- Analyst: who found lead
RFI content
- Request: summary of question
- Requestor
- Output: expected product (IoCs, briefing document, presentation)
- References: document(s) related to request
- Priority, due date
Fix
C2 communication
- Destination: known bad IP addresses, domains; unexpected locations
- Content: unexpected encrypted traffic, mismatches between content & protocol, suspicious metadata
- Frequency: patterns in communication frequency
- Duration: patterns in message length
Unusual traffic patterns that indicate data entering or leaving network, & unusual interactions between internal systems, can indicate attack.
Detecting exfiltration
- Monitor content (e.g., DLP)
- Monitor connection metadata
- Monitor ATT&CK techniques
Finish
Stages: mitigate, remediate, rearchitect
Finish phase can tip off adversary, so consider their potential responses, then act as quickly as possible to prevent persistence.
Monitoring lifecycle for signatures: creation, testing, deployment, refinement, retirement
Exploit
Gather data from investigation, analyze it for intel value, integrate it into detection and prevention methods & strategic initiatives (risk assessments, prioritization of efforts, future security investments).
Goal of 1st half of F3EAD is to give IR a tactically competitive advantage. Goal of 2nd half of F3EAD is to gain a strategically competitive advantage (understand adversary so well that their usual tactics and techniques won’t work).
OASIS suite
- STIX: observables, context, relationships
- TAXII: STIX transportation & sharing framework
OpenIOC: Mandiant’s standard for capturing IOCs; largely deprecated
ATT&CK: framework that describes relationships between Adversary Group, Technique, Tactic, Software
VERIS: framework that captures info about incident’s Actor, Action, Asset, and Attribute, timeline, impact; used to understand risk
CAPEC: framework that captures attack pattern, including prerequisites, related weaknesses, related vulnerabilities, attacker steps
TIPs
- MISP: free; robust sharing
- YETI: free; designed to enable organization & analysis of various CTI components in 1 place; can do some indicator enrichment
Most commercial TIPs also manage system config, handle setup & hardware management, offer support for troubleshooting or feature requests. They’re generally easier to set up and maintain.
Analyze
Choosing structured analytic technique (SAT)
- Determine question to answer
- Identify nature of question (e.g., diagnose, predict)
- Determine if you have enough info to make hypothesis(es)
Key Assumptions Check
Method to identify assumptions being used, to fill info gaps & determine whether assumptions are valid
- Gather people familiar with project & analysts who aren’t familiar.
- Identify topic. Ask each participant to write their assumptions.
- As a group, review everyone’s assumptions & brainstorm more.
- For each assumption, ask key questions (e.g., “Why do we think this is true?” “How much evidence supports this assumption?”). Propose alternate assumptions that would significantly change perception.
- For each assumption, evaluate whether it’s sound, supported but with some caveats, or unsupported or questionable. Or, use 1–5 scale to rate confidence. For low-confidence assumptions, plan to gather additional info to help determine whether to keep them.
- Assign each key assumption a place on a 2x2 matrix measuring high & low certainty, high & low potential impact. Low certainty/high potential impact assumptions are priority.
Analysis of Competing Hypotheses (ACH)
Method to determine most likely hypothesis among several
- Identify hypotheses to consider.
- Make list of evidence for & against each hypothesis.
- Create matrix to evaluate whether each piece of evidence supports or refutes each hypothesis.
- Conduct initial analysis to refine matrix.
- Draw initial conclusions about likelihood of each hypothesis, focusing on disproving them.
- Analyze how much of conclusion depends on single piece of evidence.
- Report conclusions on likelihood of all hypotheses.
- Identify situations in which analysis would need to be reevaluated.
Indicator Generation, Validation, & Evaluation
Method to generate, validate, evaluate list of indicators (IoCs or other observables) prior to analysis
- Generate list of indicators that identify that particular activity is occurring or not.
- Validate that each indicator can be observed (directly or indirectly), is reliable & specific. Rate according to likeliness to identify activity.
Use contrarian techniques (Devil’s Advocate, “What If” Analysis, Red Team Analysis) when wrong judgment would have serious consequences, or when you expect judgment to be contested. “What If” Analysis sees how other variables would change analysis. Red Team Analysis analyzes how adversary would think/act.
Futures Wheel: forecasting technique that predicts chain reaction
Target-centric analysis focuses on analyst-customer and analyst-collector relationships to build model of situation.
Target-centric analysis: Iterative process where info is gathered, analyzed to see if it helps answer questions. May generate new requirements. If more info is needed, collection & processing phases are repeated, info is disseminated. Analysts frequently ask customers if situation & needs have changed.
Analysis process
- Determine what to analyze
- Enrich data
- Reference info from sharing relationships
- Develop hypothesis
- Evaluate key assumptions
Questions to determine what to analyze
- Why were we targeted? Analyze how they affected you, actions they took.
- Who attacked us? Analyze tactics, targets, operating hours, infrastructure used, etc.
- How could this have been prevented?
- How can this be detected? Analyze hashes, IP addresses, targets, tactics.
- Are there any patterns that can be identified? Analyze targets, infrastructure used, social engineering, etc.
Enrichment sources
- WHOIS (identify attacker infrastructure, compromised domains, researcher-run infrastructure & sinkholes)
- Passive DNS (understand nature of activity; pair with WHOIS)
- Certificates
- Malware (detection ratio, file details [fill knowledge gaps, indicate uniqueness], behavior [hash, installation destination, files it calls or relies on, automated actions])
- Biz ops: what’s happening in network & org at time of incident
- User information: which users were targeted, attacker’s tactics
Share via ISACs, ISAOs, public/private partnerships, informal groups.
Evaluating key assumptions
- Identify all key assumptions
- Identify why assumption was made
- Assess confidence in assumption
- Identify how confidence rating was determined
- Challenge each assumption, determine if it’s true
- Remove assumptions that aren’t true or have low confidence
Biases
- Confirmation bias
- Anchoring bias
- Availability bias
- Bandwagon effect
- Mirroring (mirror-image bias)
Make judgment
- Assess likelihood of hypothesis based on evidence. Focus on disproving rather than proving. Identify info that disproves.
- Review info that led to judgment. Note if a single piece of evidence weighed most heavily, how confident you are in it.
- Record conclusion on each hypothesis, citing evidence & confidence.
- Articulate under what circumstances analysis would need to be reevaluated. State indicators.
Judgment formula: I/we assess with [low, moderate, high] confidence that [state judgment] based on [state evidence]. I/we will be monitoring [state indicators] to further support or refute this judgment.
Disseminate
Explicitly state customer’s goal/expectations for product.
Writing for leadership
- Focus on intel necessary to make biz decisions.
- Use intel to tell story of threat.
- Be brief, to the point. Start with executive summary.
Writing for technical customers
- Focus on improving detection, minimizing false positives
- Focus on data
- Be highly technical & descriptive, with references & research
- Back up products with machine-consumable products (e.g., STIX, YARA)
- Include method for accepting feedback, questions
Customer personas
- Name
- Title
- Key characteristics
- Department
- Reports to
- Background
- Technical acumen
- Preferred product
- Goals & challenges
- Values & fears
If you have many customers, use a few general personas. If you have few customers, use detailed personas for each. Or use detailed personas for key customers & general ones for others.
Actionability
- Provide info on adversary TTPs
- Ensure products that contain IoCs & signatures are easy for customers to use (e.g., Snort, YARA)
- Answer customer’s questions
- Avoid broad descriptions of activity without meaningful details
- Don’t hinder copying info
- Avoid vendor-specific formats
- Don’t over-classify info
Customer characteristics
- Needs (problems, questions)
- Tech (tools)
- Maturity (skill level of team)
- Methodologies
Drafting
- Start with thesis statement; narrative format is natural for producers & customers
- Start with facts (times, indicators, concrete info)
Avoid
- Passive voice
- Uncommon terms & acronyms
- Leading or unobjective language
- Imprecision about known versus suspected
Consider visualizing data, adding graphics.
Writing structure
- What: issues, facts
- So what: why issues & facts are important to stakeholders
- Now what: actions customers can or should take
Short-form products: 1–2 pages; address specific tactical or operational intel needs
Target package: actor description; useful for summarizing info from vendor reports; fact-based; don’t get too far into estimative analysis, attribution
Campaign report: end-to-end breakdown of intrusion campaign; useful for identifying analysis gaps, which may lead to RFIs; useful for identifying missing response actions & bringing stakeholders up to speed
Intel estimate: provides context necessary for making strategic decisions (examples)
Use YYYYMMDD format to be easier to read & sort. Use 24-hour clock & consistent time zone (preferably UTC).
Use feedback to improve customer personas.
Weekly threat report: 1-page product focused on ongoing investigations & incidents, situational awareness (security news); good for variety of customers
5 questions to ask when writing products
- What is goal?
- Who is audience?
- What is proper length?
- Tactical, operational, or strategic?
- What language tone? Technical or nontechnical?
Strategic Intelligence
Strategic info: geopolitical, economic, historical, business
Analyze strategic intel with SWOT analysis, brainstorming, scrub down.
Scrub down (aka murder board): analyst presents findings to review board, which questions findings & analytic processes; helps identify biases, unvalidated key assumptions, analytic leaps not founded on evidence.
Anticipatory intel: studying situation & surrounding context, environment, & related situations to anticipate broad spectrum of possible future events & implications
Questions answered by strategic intel
- Which threats are most significant to org? Where should IR prioritize & focus?
- Which types of info are important to capture? What findings warrant brief to CISO or other execs?
- What situations may emerge as world changes?
- How do external situations (financial crises, global conflict, pandemics, etc.) impact security posture?
Building an Intelligence Program
Use 3rd-party intel & feeds for enrichment, not primary source.
Link new uses/tactics to existing indicators while weeding out indicators that are no longer valid.