farouq7assan0o/Threat-Intelligence-Analysis-MITRE-ATT-CK-Mapping
GitHub: farouq7assan0o/Threat-Intelligence-Analysis-MITRE-ATT-CK-Mapping
Stars: 0 | Forks: 0
# 威胁情报分析与 MITRE ATT&CK 映射
**作者:** Farouq Hassan
**专注领域:** 威胁情报、MITRE ATT&CK、OSINT 分析、影响评分、恶意软件分析
**涵盖主题:**
* APT29 (NOBELIUM) 活动分析
* Lumma Stealer 恶意软件分析
# 第一部分 — APT29 (NOBELIUM) 活动分析
📄 来源:
## 1️⃣ 活动演变
APT29 展示了初始访问技术的转变:
### 2020 年活动
* **供应链入侵**
* 目标:SolarWinds Orion
* 技术:T1195.002
### 2021 年活动
* **电子邮件鱼叉式钓鱼**
* 平台:USAID 通过 Constant Contact
* 技术:T1566.002
这反映了初始访问向量的战略性适应。
(第 1 页 )
## 2️⃣ 行为链摘要
| 阶段 | 观察到的行为 |
| -------------------- | -------------------------------- |
| Initial Access | 供应链入侵或鱼叉式钓鱼 |
| Execution | 基于 PowerShell 的执行 |
| Persistence | 计划任务、后门 |
| Privilege Escalation | 凭据/令牌滥用 |
| Defense Evasion | 混淆 |
| Discovery | 账户枚举 |
| Lateral Movement | 远程服务 |
| Command & Control | 基于 HTTP/S Web |
| Collection | 电子邮件 + 目录数据 |
| Exfiltration | C2 通道 |
(第 1 页 )
## 3️⃣ ATT&CK 技术影响评分
📄 来源:
影响评分模型:
* High(高) = 90
* Medium(中) = 60
* Low(低) = 30
| 技术 ID | 名称 | 影响 |
| ------------ | -------------------------- | ----------- |
| T1195.002 | Supply Chain Compromise | High (90) |
| T1566.002 | Spearphishing Link | Medium (60) |
| T1204.002 | User Execution | Medium (60) |
| T1059.001 | PowerShell | Medium (60) |
| T1053.005 | Scheduled Task | Medium (60) |
| T1550.001 | Access Token Abuse | High (90) |
| T1071.001 | Web C2 | Medium (60) |
| T1027 | Obfuscation | Medium (60) |
| T1087 | Account Discovery | Low (30) |
| T1041 | Exfiltration over C2 | Medium (60) |
| T1114 | Email Collection | Medium (60) |
| T1003.001 | LSASS Credential Dumping | High (90) |
(第 2 页 )
## 4️⃣ 完整 ATT&CK Navigator JSON(原文附录)
以下是用于 ATT&CK Navigator 的完整 JSON:
```
{
"name": "NOBELIUM / APT29 – OSINT TTP mapping (impact-scored)",
"version": "4.5",
"domain": "enterprise-attack",
"description": "OSINT-based ATT&CK technique mapping with impact-based scoring: High=90, Med=60, Low=30.",
"filters": {
"platforms": [
"Windows",
"Linux",
"macOS",
"Azure AD",
"Office 365"
]
},
"sorting": 0,
"layout": {
"layout": "side",
"showName": true,
"showID": true
},
"techniques": [
{ "techniqueID": "T1195.002", "score": 90, "color": "#ff4d4d", "comment": "SolarWinds Orion supply-chain compromise." },
{ "techniqueID": "T1566.002", "score": 60, "color": "#ffb84d", "comment": "USAID/Constant Contact spearphishing links." },
{ "techniqueID": "T1204.002", "score": 60, "color": "#ffb84d", "comment": "User execution of malicious payload." },
{ "techniqueID": "T1059.001", "score": 60, "color": "#ffb84d", "comment": "PowerShell execution for staging." },
{ "techniqueID": "T1053.005", "score": 60, "color": "#ffb84d", "comment": "Scheduled Task persistence." },
{ "techniqueID": "T1550.001", "score": 90, "color": "#ff4d4d", "comment": "Access token and identity abuse." },
{ "techniqueID": "T1071.001", "score": 60, "color": "#ffb84d", "comment": "Web-based command and control." },
{ "techniqueID": "T1027", "score": 60, "color": "#ffb84d", "comment": "Payload obfuscation." },
{ "techniqueID": "T1087", "score": 30, "color": "#fff176", "comment": "Account discovery." },
{ "techniqueID": "T1041", "score": 60, "color": "#ffb84d", "comment": "Exfiltration over C2 channel." },
{ "techniqueID": "T1114", "score": 60, "color": "#ffb84d", "comment": "Email collection." },
{ "techniqueID": "T1003.001", "score": 90, "color": "#ff4d4d", "comment": "LSASS credential dumping." }
],
"legendItems": [
{ "label": "High impact (90)", "color": "#ff4d4d" },
{ "label": "Medium impact (60)", "color": "#ffb84d" },
{ "label": "Low impact (30)", "color": "#fff176" }
]
}
```
(完整 JSON 见第 3–4 页 )
# 第二部分 — Lumma Stealer 恶意软件分析
📄 来源:
## 1️⃣ 恶意软件概述
Lumma Stealer 是一种信息窃取恶意软件,目标是:
* 凭据
* 浏览器数据
* 加密货币钱包
常见传播方式:
* 钓鱼邮件
* 恶意广告
* 破解软件安装程序
(第 1 页 )
## 2️⃣ 传播、执行、持久化
### 传播
* 恶意邮件附件或链接
### 执行
* PowerShell
* 原生 Windows APIs
### 持久化
* 计划任务
* 注册表 Run 键
(第 1 页 )
## 3️⃣ 入侵指标
| 类型 | 指标 |
| -------- | --------------------------------------------------- |
| File | `%AppData%` 中的随机化 `.exe` |
| Network | 向硬编码 IP 发起的 HTTP POST |
| Registry | HKCU\Software\Microsoft\Windows\CurrentVersion\Run |
(第 1 页 )
## 4️⃣ ATT&CK 映射(JSON 摘录)
📄 来源:
```
{
"name": "Lumma Stealer ATT&CK Mapping",
"version": "4.5",
"domain": "enterprise-attack",
"techniques": [
{ "techniqueID": "T1566.001", "score": 9, "comment": "Malspam delivery" },
{ "techniqueID": "T1204.002", "score": 8, "comment": "User execution" },
{ "techniqueID": "T1059.001", "score": 7, "comment": "PowerShell execution" },
{ "techniqueID": "T1053.005", "score": 8, "comment": "Scheduled task persistence" },
{ "techniqueID": "T1027", "score": 6, "comment": "Obfuscation" },
{ "techniqueID": "T1555", "score": 9, "comment": "Credential harvesting" },
{ "techniqueID": "T1005", "score": 7, "comment": "Local data collection" },
{ "techniqueID": "T1071.001", "score": 8, "comment": "HTTP C2" },
{ "techniqueID": "T1041", "score": 9, "comment": "Exfiltration over C2" }
]
}
```
## 5️⃣ 防御建议
来自第 4 页 :
* 改进邮件过滤
* 限制 PowerShell 执行
* 监控出站流量
* 实施应用程序白名单
# 对比分析 — APT29 vs Lumma
| 类别 | APT29 | Lumma Stealer |
| ---------------- | ---------------------------- | ---------------------------- |
| Actor Type | Nation-state | Cybercrime malware |
| Initial Access | Supply-chain / Spearphishing | Malspam / Phishing |
| Credential Abuse | Access token abuse | Browser/password store theft |
| C2 | Web-based HTTP/S | HTTP POST hard-coded |
| Impact | Strategic espionage | Credential/data theft |
# 展示的技能
* OSINT 威胁情报分析
* MITRE ATT&CK 映射
* 影响评分方法论
* ATT&CK Navigator JSON 构建
* 恶意软件行为分析
* IOC 识别
* 防御控制建议
* 跨活动比较
# 安全价值
本次会话展示了:
* 结构化威胁行为体分析
* 行为链建模
* 将真实活动映射到 ATT&CK
* 将情报转化为防御建议
* 连接威胁情报与蓝队策略
标签:APT29, Cloudflare, DAST, DNS 反向解析, ESC4, Homebrew安装, IPv6, IP 地址批量处理, Lumma Stealer, MITRE ATT&CK, NOBELIUM, OSINT, PE 加载器, PowerShell, SolarWinds, TTPs, 供应链攻击, 信息窃密, 凭据窃取, 初始访问, 协议分析, 命令与控制, 威胁情报, 开发者工具, 影响评估, 恶意软件分析, 战术技术, 权限提升, 横向移动, 私有化部署, 红队战术, 编程规范, 网络安全, 网络安全审计, 远控, 防御加固, 防御规避, 隐私保护, 高危漏洞, 鱼叉钓鱼