2 hours 24 minutes
says Module one less than six. Hedging your biases
this lesson. We have two main objectives.
The first is to go over the importance of collaboratively assessing attack Wrappings
is going to cover a bit of why some of that Step five is so important from the attack mapping process.
Then I'm going to get into some about analyst and source biases in some ways to hedge against them.
So Step five of the process we gave, which is to compare with other analysts, can be really important in doing attack, mapping or, frankly, any other intelligence analysis.
This can help hedge against analyst biases,
so I'll be getting into a number of different reasons why different analysts might come up with different answers.
But everyone has a different set of experiences in background that they're drawing upon as they do intelligence analysis.
So where one analyst may see non application layer protocol and another may see custom command and control protocol,
it's important to figure out why these differences exist.
Be consistent in how you map and apply techniques.
If other analysts can't review, your mapping is try to make sure that you're at least doing it the same way as you go across different reports and how you're using a given technique,
so it can also be tempting. And once you're experienced with attack, you'll probably occasionally skip steps in the mapping process.
You may be going straight to identifying an applicable technique or sub technique.
You know, maybe you don't need to go through a long process to identify
fishing spearfishing attachment in a report.
But it is important to remember that this does increase your bias.
It's drawing from availability, bias, the techniques that you have in your head that you're already familiar with
versus the full range of techniques.
So it's probably something you're eventually gonna work up to doing, but it wants to always be done with a little bit of caution.
So I'm going to get into one of my favorite areas of cyber threat intelligence,
which is biases and intelligence reporting.
I'm going to talk about the specifically in terms of attacked map data, but these exist all throughout Cyber threat intelligence.
The first thing about biases is it's important for us to recognize that they exist and to understand some of what our biases are
in cyber threat intelligence.
I'm going to get into two key types of bias
in areas like the technique examples that are in attack. And so these these biases exist in the data that the attack team puts out an attack groups and software wrappings as well as work. You do yourself in mapping attack.
And so the two types I'm going to get into our
bias introduced by us as consumers
and bias that's inherent in the types of sources we use.
Understanding these biases is the critical first step
and effectively leveraging the data.
So the first bias is in the set of sources that you use.
So these are actually the percentages for
reports that we have in a tax groups and software packages and attacked at mitre dot org.
The vast majority of the material that we are able to leverage
is coming from security vendors is mostly coming from incident response.
In some cases, governments have put out reports things like indictments. Uh, and in some cases there's high quality press reporting that gets into activities that adversaries have done.
And it's not that there's anything bad with this, but it's important to understand the biases in the specific sources that are making up our intelligence
and you're set of sources is probably going to look a little bit different than this. Attack has some specific constraints in using free and open source threat intelligence reporting.
Another set of biases that we're going to have as we go through data
is novelty and availability, bias
and as the attack team were absolutely
hit with novelty bias.
So somebody is putting out a report. It's talking about, uh, technique. We've seen a bunch before a group we've seen a bunch before, so
Fuzzy Duck is using power shell again.
It might not be as interesting for us, and it might not come up to the top of the queue is fast for us adding it to attack.
Whereas, you know, some brand new technique, we have out transmitted data manipulation. Very few actors do that,
Uh, we don't have report in on a P T elite, so a P T. Lee, using transmitted data manipulation, is going to be a lot more novel to us, and we just need to be aware of these biases And are they blinding us to important activity?
As we remember ourselves, we again have that availability bias
attack is big as hundreds of techniques,
and they're going to be a subset of techniques that you remember in your head that you know that you're familiar with. You can immediately go and map to,
and you're more likely to find those techniques and reporting. So it's important to recognize
if you found a certain frequency of a technique to understand what that may mean in terms of how many times it occurs.
They're also biases in the sources we use,
so to get into two availability and visibility,
the people that are creating the reports for using have their own availability bias.
They have behaviors they've seen adversaries do before. They understand, as they're looking at their data
and are able to go in and analyze those behaviors a lot more effectively.
Whereas there is a wider range of things that adversaries might actually be doing,
they also have visibility bias. So a lot of the data that we're talking about is coming from incident response, so it's likely that it's only types of data that can be gathered afternoon intrusion that are being included in the reports.
So there are certain types of behaviors that appear more, depending on the type of sensing and the type of data that you're actually able to use in your reporting.
It's also victim novelty biases in the reporting we use.
Victim bias is that some victims are going to be potentially more interesting to be reported upon and so more likely to generate a report. So it could be some particular industry, a really big name, company and incident happening to
the other way that who the victim is impacts. The reporting is that in a lot of cases, companies are getting permission from victims before reporting on them, even if it is anonymously
so it can have a big impact which type of industry what kind of reporting requirements they have. If the report even comes out at all based on who the victim is,
and given that we're working off of, in a lot of cases, free reports,
there is some novelty bias that we need to watch out for two
and a lot of cases threat Intelligence reports are coming out of a marketing budget,
so there is some pressure where if there's a group that's had frequent past reporting,
maybe it's a little less likely We're going to see a report on this, and we've seen this out in the wild, where
groups like a P T. 10 there was no reporting on them for a number of years, even though people were seeing them out in the wild. But they just weren't doing anything particularly new and industry
interesting. Lo and behold, they break into a bunch of service providers, and suddenly there's reporting out there again.
Whereas it might be more interesting to get a report out on the new group on the block
a p t. 1338 instead of a PT lead.
So these aren't bad. They exist. There are things that we need to recognize,
and there's some strategies we can take for hedging these biases.
And the first is that Step five that we gave
If you're collaborating with others, it can help mitigate, especially your own biases.
Diversity of thought and diversity, period on your team's makes for stronger teams.
Justin, calibrate your data sources. Understand how your data is potentially skewed and adjust for that as you work with it.
Try to work with as diverse a set of sources as you can.
Uh, and oftentimes the absolute best data is going to be that you gather yourself where you've got full access to all the information around it and have a much better idea of how that data is shaded.
And finally, in working with all of this,
we were talking about gaps. We're talking about places you might not see.
What we do have is an opportunity to prioritize the known.
Hopefully everything we're talking about are things that we do know
as opposed to worrying about the unknown.
It does mean that we may not be able to say that
spearfishing attachment is more popular than
a supply chain compromise,
but it does mean that we can say Okay, we've seen both of these existing out in the wild.
So I've gone over a couple of things in here, uh, talked about why it's so important to work with other analysts collaboratively assess attack mapping as well as other threat intelligence. And I've gotten into some key types of bias that you're trying to hedge as you do that collaboration and other work with threat intelligence.
So I've just gotten into the second part
of this attack for CT journey,
getting into a number of steps to help you map narrative data to attack.
Next up, we're going to be going into how you can apply that same process to work with raw data.
MITRE ATT&CK Defender™ (MAD) ATT&CK® SOC Assessments Certification Training
This course prepares you for the ATT&CK® Security Operations Center Certification. In this course, students ...
2 CEU/CPE Hours Available
Certificate of Completion Offered
MITRE ATT&CK Defender™ (MAD) ATT&CK® Fundamentals Badge Training
This course is the fundamental piece of the MITRE ATT&CK Defender™ (MAD) series where we ...
2 CEU/CPE Hours Available
Certificate of Completion Offered