Clark Flores
Written on

Threat Hunting with MITRE ATT&CK Framework and Windows Event Logs

(I hope)

Introduction

What is MITRE?

MITRE is a non-profit organization that supports government and industry in research and development, focusing on national security, healthcare, and cybersecurity. They are known for creating frameworks like ATT&CK to enhance threat detection and defense strategies.

What is ATT&CK?

ATT&CK (Adversarial Tactics, Techniques, and Common Knowledge) is a globally accessible framework by MITRE that details adversary tactics and techniques based on real-world observations. It helps organizations understand and improve their cybersecurity defenses against various threats.

What is TTP?

TTP stands for Tactics, Techniques, and Procedures, which describe the behavior and methods used by adversaries during cyberattacks. It helps analysts understand and identify patterns of malicious activity to better defend against threats.

What is Windows Event Log?

Windows Event Log is a system in Microsoft Windows that records significant events like system notifications, errors, and security-related activities. It is used for monitoring and analyzing system behavior, aiding in the detection of security incidents.

Overview of MITRE ATT&CK Framework

Mapping Windows Event Log with MITRE ATT&CK Framework

It is important to note that it’s not 1=1 with Windows Event logs and MITRE ATT&CK Framework. Windows Event IDs can be linked with multiple tactics and techniques.

When investigating a possible attack it is always worthy to establish the context of the analysis.

For example, the ‘T1078 Valid Accounts’ exists under Initial Access, Persistence, Privilege Escalation tactics. So using the Event IDs: 4624, 4625, 4672, 4648, 4768, 4749, 4634, we can track which credentials were used then we can identify the context of the data enough to determine where its at in the framework. All I’m yapping about is that, these IDs are not a sure-fire way to get you the answer that you need. It’s still you, the analyst, whom will pin-down the answer that you’re looking for ;) you can do this.

TID
Technique NameRelated Windows Event ID
T1001Data Obfuscation(4688, 4104)
T1003OS Credential Dumping(4688, 4663, 4624)
T1005Data from Local System(4663, 4690)
T1006Direct Volume Access(4697, 4698)
T1007System Service Discovery(7045, 4688)
T1008Fallback Channels(5156, 4688)
T1010Application Window Discovery(4688)
T1011Exfiltration Over Other Network Medium(5156, 4663, 4688)
T1012Query Registry(4657, 4663)
T1014RootkitNA
T1016System Network Configuration Discovery(4688, 4656)
T1018Remote System Discovery(5140, 5156)
T1020Automated Exfiltration(5156, 4688)
T1021Remote Services(4624)
T1025Data from Removable Media(4663, 4624)
T1027Obfuscated Files or InformationNA
T1029Scheduled Transfer(4698, 4699, 4688)
T1030Data Transfer Size Limits(5156, 5152, 4688)
T1033System Owner/User Discovery(4698, 4699, 4688)
T1036Masquerading(4688)
T1037Boot or Logon Initialization Scripts(4688)
T1039Data from Network Shared Drive(5140, 4663)
T1040Network Sniffing(5158, 5156)
T1041Exfiltration Over C2 Channel(5156, 4688)
T1046Network Service Discovery(5156, 5140)
T1047Windows Management Instrumentation(4688, 4104)
T1048Exfiltration Over Alternative Protocol(5156, 5152)
T1049System Network Connections Discovery(5156, 5158)
T1052Exfiltration Over Physical Medium(4663, 4624)
T1053Scheduled Task/Job(4698, 4702, 4699)
T1055Process Injection(4688)
T1056Input Capture(4688, 4657)
T1057Process Discovery(4688, 4656)
T1059Command and Scripting Interpreter(4688, 4104, 4103)
T1068Exploitation for Privilege Escalation(4624, 4672)
T1069Permission Groups Discovery(4798, 4799)
T1070Indicator Removal(1102, 104, 4726)
T1071Application Layer Protocol(5156, 4688)
T1072Software Deployment Tools(4688)
T1074Data Staged(4663, 5140)
T1078Valid Accounts(4624, 4625, 4672, 4648, 4768, 4749, 4634)
T1080Taint Shared Content(5140)
T1082System Information Discovery(4688, 4656)
T1083File and Directory Discovery(4663, 4656)
T1087Account Discovery(4798, 4799, 4648)
T1090Proxy(5156, 4624)
T1091Replication Through Removable Media(20001 (USBStor), 4688, 4663)
T1092Communication Through Removable Media(4663, 4624)
T1095Non-Application Layer Protocol(5156, 4688)
T1098Account Manipulation(4720, 4722, 4726, 4725, 4738)
T1102Web Service(5156, 4624)
T1104Multi-Stage Channels(5156, 4688)
T1105Ingress Tool Transfer(4663, 5156)
T1106Native API(4688)
T1110Brute Force(4625, 4771, 4648)
T1111Multi-Factor Authentication Interception(4624, 4776)
T1112Modify Registry(4657)
T1113Screen Capture(4688, 4656)
T1114Email Collection(4663, 4624)
T1115Clipboard Data(4663, 4688)
T1119Automated Collection(4688, 4698)
T1120Peripheral Device Discovery(4656, 4688)
T1123Audio Capture(4698, 4688)
T1124System Time Discovery(4688, 4656)
T1125Video Capture(4688, 4698)
T1127Trusted Developer Utilities Proxy Execution(4688)
T1129Shared Modules(4688, 4657, 7045)
T1132Data Encoding(4688, 5156)
T1133External Remote Services(4624, 4625, 4778, 4779, 4648)
T1134Access Token Manipulation(4648, 4672)
T1135Network Share Discovery(5140, 4656)
T1136Create Account(4720)
T1137Office Application Startup(4688, 4104)
T1140Deobfuscate/Decode Files or InformationNA
T1176Browser Extensions(4688)
T1185Browser Session Hijacking(4624, 4688)
T1187Forced Authentication(4648, 4672)
T1189Drive-by Compromise(4688, 4104, 4697, 7045, 4720, 4776)
T1190Exploit Public-Facing Application(4688, 4624, 4625, 4697, 7045, 5156, 1102)
T1195Supply Chain Compromise(4688, 7045)
T1197BITS Jobs(4690, 4691, 4697)
T1199Trusted Relationship(4624, 4672, 4776)
T1200Hardware Additions(20001 (USBStor), 6416)
T1201Password Policy Discovery(4673, 4688)
T1202Indirect Command Execution(4688)
T1203Exploitation for Client Execution(4688, 4104)
T1204User Execution(4688, 4104)
T1205Traffic Signaling(5156, 5157, 5152)
T1207Rogue Domain Controller(4713)
T1210Exploitation of Remote Services(4624)
T1211Exploitation for Defense EvasionNA
T1212Exploitation for Credential Access(4673, 4688)
T1213Data from Information Repositories(4663, 4688)
T1216System Script Proxy Execution(4688)
T1217Browser Information Discovery(4663, 4688)
T1218System Binary Proxy Execution(4688)
T1219Remote Access Software(5156, 4688)
T1220XSL Script Processing(4688)
T1221Template InjectionNA
T1222File and Directory Permissions Modification(4670, 4660, 4663)
T1480Execution GuardrailsNA
T1482Domain Trust Discovery(4769, 4739)
T1484Domain or Tenant Policy Modification(4670, 4739)
T1485Data Destruction(4660, 4663)
T1486Data Encrypted for Impact(5156, 4670)
T1489Service Stop(7036)
T1490Inhibit System Recovery(4698, 4699)
T1491Defacement(5156, 4688)
T1495Firmware Corruption(4688)
T1496Resource Hijacking(5156, 4688)
T1497Virtualization/Sandbox Evasion(4688, 4656)
T1498Network Denial of Service(5156, 5152)
T1499Endpoint Denial of Service(5156)
T1505Server Software Component(7045, 4697, 4688)
T1518Software Discovery(4688, 4656)
T1525Implant Internal Image(4688)
T1526Cloud Service Discovery(4624, 4688)
T1528Steal Application Access Token(4769, 4648)
T1529System Shutdown/Reboot(1074, 6008)
T1530Data from Cloud Storage(4624, 4663)
T1531Account Access Removal(4726, 4720)
T1534Internal Spearphishing(4688)
T1535Unused/Unsupported Cloud RegionsNA
T1537Transfer Data to Cloud Account(5156, 4663, 4688)
T1538Cloud Service Dashboard(4624, 4663)
T1539Steal Web Session Cookie(4624, 4688)
T1542Pre-OS Boot(12, 1, 13)
T1543Create or Modify System Process(7045, 4697, 4688)
T1546Event Triggered Execution(4698, 4697)
T1547Boot or Logon Autostart Execution(7045, 4697, 4688)
T1548Abuse Elevation Control Mechanism(4673)
T1550Use Alternate Authentication Material(4648)
T1552Unsecured Credentials(4663, 4624)
T1553Subvert Trust Controls(4691)
T1554Compromise Host Software Binary(4688, 4657, 7045)
T1555Credentials from Password Stores(4624, 4663)
T1556Modify Authentication Process(4673, 4688, 4657, 4776)
T1557Adversary-in-the-Middle(5156, 5157, 4648)
T1558Steal or Forge Kerberos Tickets(4769, 4770, 4768)
T1559Inter-Process Communication(4688)
T1560Archive Collected Data(4688, 4104)
T1561Disk Wipe(4663, 4688)
T1562Impair Defenses(7036, 7040)
T1563Remote Service Session Hijacking(4648)
T1564Hide Artifacts(4660, 4663)
T1565Data Manipulation(4663)
T1566Phishing(4688, 4104, 4625)
T1567Exfiltration Over Web Service(5156, 4624, 4688)
T1568Dynamic Resolution(5156, 4688)
T1569System Services(7045, 4697, 4688)
T1570Lateral Tool Transfer(4688)
T1571Non-Standard Port(5156, 5152)
T1572Protocol Tunneling(5156, 4688)
T1573Encrypted Channel(5156, 4624)
T1574Hijack Execution Flow(7045, 4657, 4688)
T1578Modify Cloud Compute InfrastructureNA
T1580Cloud Infrastructure Discovery(4624, 4648)
T1583Acquire Infrastructure(5156, 4688)
T1584Compromise Infrastructure(5156, 4688)
T1585Establish Accounts(4720, 4726)
T1586Compromise Accounts(4720, 4722, 4725, 4726, 5156, 4688)
T1587Develop Capabilities(4688, 4697)
T1588Obtain Capabilities(4690, 4691)
T1589Gather Victim Identity Information(4624, 4625, 4672, 4648, 4768, 4769, 4964, 4798, 4799)
T1590Gather Victim Network Information(4624, 4648, 4672, 5145, 5156, 5157, 4662, 4776)
T1591Gather Victim Org Information(4662, 4661, 4768, 4769, 4798, 4799, 5145)
T1592Gather Victim Host Information(4624, 4688, 4648, 4672, 5145, 4769, 4663)
T1593Search Open Websites/Domains(4688, 4104, 4624, 4625, 4656, 5145)
T1595Active Scanning(5156, 5157, 4662, 4663, 4776)
T1596Search Open Techical Databases(4688, 4104, 4624, 4625, 4656, 5145)
T1597Search Closed Sources(4624, 4625, 4688, 4662, 4104, 5145)
T1598Phishing for Information(4688, 4104, 4624, 4625, 4720, 4698)
T1599Network Boundary BridgingNA
T1600Weaken EncryptionNA
T1601Modify System ImageNA
T1602Data from Configuration Repository(4663, 4670)
T1606Forge Web Credentials(4624, 4648)
T1608Stage Capabilities(4688, 5156)
T1609Container Administration Command(4688)
T1610Deploy Container(4688)
T1611Escape to Host(4624)
T1612Build Image on HostNA
T1613Container and Resource Discovery(4688, 4624)
T1614System Location Discovery(4656, 4688)
T1615Group Policy Discovery(4663, 4688)
T1619Cloud Storage Object Discovery(4663, 4624)
T1620Reflective Code LoadingNA
T1621Multi-Factor Authentication Request Generation(4624, 4625)
T1622Debugger Evasion(4688)
T1647Plist File ModificationNA
T1648Serverless Execution(4688)
T1649Steal or Forge Authentication Certificates(4663, 4692, 4786)
T1650Acquire Access(4624, 4625, 4672)
T1651Cloud Administration Command(4688)
T1652Device Driver Discovery(4657, 4688)
T1653Power Settings(4688, 4657)
T1654Log Enumeration(4688, 4663)
T1656Impersonation(4648)
T1657Financial Theft(5156, 4688)
T1659Content Injection(4663, 4670, 4698, 7036, 4104, 4688)
T1665Hide Infrastructure(5156, 4688)
T1908Account Manipulation(4720, 4722, 4725, 4726, 4738)

And here the Windows Event Log description:

Windows Event IDWindows Event Log Description
104The log was cleared
600Scheduled tasks or startup scripts
800Windows Event Log records script execution at startup
1074The system has been shut down by a process/user
1101Audit events have been dropped by the transport
1102The audit log was cleared
4104Powershell script block logging
4104PowerShell command line execution
4624An account was successfully logged on
4625An account failed to log on
4634Logoff
4648A logon was attempted using explicit credentials
4656A handle to an object was requested
4657A registry value was modified
4660An object was deleted
4661A handle to an object was requested
4662An operation was performed on an object
4663An attempt was made to access an object
4670Permissions on an object were changed
4672Special privileges assigned to new logon
4673A privileged service was called
4688A new process has been created
4690Object handle granted access
4691Indirect access to an object was requested
4692Backup of data protection master key
4697A service was installed on the system
4698A scheduled task was created
4699A scheduled task was deleted
4700A scheduled task was enabled
4702A scheduled task was updated
4713Kerberos policy was changed
4720A user account was created
4722A user account was enabled
4725A user account was disabled
4726A user account was deleted
4738A user account was changed
4739Domain Policy was changed
4768A Kerberos authentication ticket (TGT) was requested
4769A Kerberos service ticket was requested
4770A Kerberos service ticket was renewed
4771Kerberos pre-authentication failed (for Kerberos brute force)
4776The computer attempted to validate the credentials for an account
4778A session was reconnected to a Window Station
4779A session was disconnected from a Window Station
4786Credential roaming store load
4798A user’s local group membership was enumerated
4799A security-enabled local group membership was enumerated
4964Special groups have been assigned to a new logon
5140A network share object was accessed
5145A network share object was accessed
5152The Windows Filtering Platform has blocked a connection
5156Windows Filtering Platform has permitted a connection
5157Windows Filtering Platform has blocked a connection
5158The Windows Filtering Platform permitted a bind to a local port
6008The previous system shutdown was unexpected
6416A new external device was recognized by the system
7036The service has entered the running state
7040A service startup type was changed
7045A service was installed in the system
20001 (USBStor)A USB device was connected

Personal thoughts

Hmm. Not really sure if these were accurate enough, haven’t tested it yet in an SIEM or log viewer. Definitely will test these. But FWIW, here’s Ultimate Windows Security and MITRE. Also, this project called DeTTECT looks cool. Worth to check out.