ATT&CKÇý¶¯ÏµÄÇå¾²ÔËÓªÊý¾ÝÆÊÎö£¬ÔõÑù¡°Â䵨¡±£¿
2020-11-25
?ATT&CK£¨AdversarialTactics, Techniques, and Common Knowledge£©ÊÇÒ»¸ö¹¥»÷ÐÐΪ֪ʶ¿âºÍÍþв½¨Ä£Ä£×Ó£¬Ö÷ÒªÓ¦ÓÃÓÚÆÀ¹À¹¥·ÀÄÜÁ¦ÁýÕÖ¡¢APT¹¥»÷·À»¤¡¢Íþвá÷ÁÔ¡¢ÍþвÇ鱨¹ØÁª¼°¹¥»÷Ä£ÄâµÈÁìÓò¡£×ÔÐû²¼ÒÔÀ´£¬ÖªÊ¶ÉçÇøÏ൱»îÔ¾£¬Òý·¢¹¤Òµ½çºÍÑо¿½çµÄÈÈÅõ£¬ÒÑÖð½¥Éú³¤ÎªÍøÂçÍþвÆÊÎöÓᄈϵÄͨÓÃÔªÓï¡£ATT&CKÒÔÏà¶ÔÊʵ±µÄ֪ʶÁýͳÌõÀí£¬³ä·ÖÁýÕÖÍþвÁìÓòµÄ¼¼Õ½Êõ³¡¾°£¬¸øÇå¾²·ÀÓùÄÜÁ¦µÄÆ¥ÅäÓë±ÈÕÕÌṩÁ˱ê¸ËºÍ×¥ÊÖ£¬ÊÇÆäÀֳɵÄÒªº¦¡£
ÔÚATT&CKµÄÇý¶¯Ï£¬Ô½À´Ô½¶àµÄÊý¾ÝԴʺ²ÞÄÜÁ¦³ÉΪÆóÒµÍþв·À»¤µÄ±êÅä¡£²»¹ý£¬¹ØÓÚÇå¾²ÔËÓªÍŶÓÀ´Ëµ£¬´ó¹æÄ£¡¢¹æ·¶»¯µÄÊÕÂÞÊý¾ÝµÄ½ÓÈëÖ»ÊÇÆðµã£¬ÔõÑùʹÓÃÊý¾Ý¶Ô¿¹Óú·¢ÒþÄäµÄ¸ß¼¶ÍþвÐÐΪ£¬Ò»Á¬½µµÍÆóÒµºÍ×éÖ¯µÄΣº¦²ÅÊÇÒªº¦ËùÔÚ¡£±¾ÎĽ«´Óʵ¼ù³ö·¢£¬Ì½ÌÖ×ܽáATT&CKÇý¶¯ÏÂÇå¾²ÔËÓªÊý¾ÝÆÊÎöµÄÊÊÓÃÐÔÌôÕ½¡£
Ò»¡¢Êý¾ÝÍÚ¾òµÄлúÔµ
ATT&CK֮ǰ£¬LockheedMartinµÄ¹¥»÷Á´Ä£×Ó£¨Cyber Kill Chain£©£¬Î¢ÈíµÄSTRIDEÄ£×ÓµÈÊÇÍþв½¨Ä£¡¢¸æ¾¯·ÖÀà·Ö¼¶¡¢ÖªÊ¶¿â½¨ÉèµÄÖ÷Òª»ù´¡¡£¸÷¸öÇå¾²³§ÉÌÆÕ±éÁ¿Éí¶¨×öÁËϸÁ£¶ÈÍþвģ×Ó¡£MITREͨ¹ý¿ªÔ´ÖÚ³ïµÄATT&CK֪ʶ¿â£¬ÒÔÊÊÖеÄÁýͳҪÁ죬½ÏÀֳɵØÊµÏÖÁËϵͳ»¯µÄ¹¥»÷Õß¼¼Õ½ÊõÐÐΪ½¨Ä££¬ÓÐÓõؽµµÍÁËÍþвÇ鱨¡¢Íþв½¨Ä£µÈÁìÓòµÄÏàͬ±¾Ç®¡£ÈôÊÇ˵¹Å°åÍþвÆÊÎöÄÜÁ¦µÄ½¨ÉèÊǸ÷ÈËÔÚ¸÷×ÔµÄÓï¾³·½ÑÔÀï×Ô˵×Ô»°£¬ÄÇôATT&CK¾Í¸ø³öÁËÒ»¸ö´ÇÊé»ùÏߣ¬Ê¶²»Ê¶×Ö¡¢ÄÜÁ¦Ç¿ÈõµÄÎÊÌâ¸÷ÈË¶ÔÆëÓïÒå¾Í¿ÉÒÔÄóöÀ´±ÈÒ»±ÈÁË¡£

ͼ1 APT29µÄÔ¤·ÀÊÖ¶ÎÓë¼ì²â£¨Êý¾ÝÔ´£©[1]
ATT&CKÎªÍøÂçÕ½³¡µÄ·ÀÊØ·½ÌṩÁËÒ»¸ö¹¥Ô¤·Àսȫ¾°ÊֲᣬÉÏͼչʾÁËÁýÕÖAPT29µÄÔ¤·ÀºÍ¼ì²âÐèҪʵÏֵĻº½â²½·¥ÁбíºÍ¼ì²âÊý¾ÝÔ´ÁÐ±í¡£°üÀ¨ÖÕ¶Ë¡¢ÍøÂç¡¢ÎļþµÈ¶àÔ´¡¢¶àά¶ÈµÄ¶þÊ®ÓàÀàÊý¾ÝµÄÊÕÂÞ£¬¸øÍþвÆÊÎö´øÀ´È«ÐÂµÄÆÊÎö»úÔµ£¬°üÀ¨¶àά¶ÈϸÁ£¶ÈµÄÏßË÷Óë¹ØÁª¡¢Éî¶ÈµÄÊÂÎñȡ֤¡¢¸ü׼ȷµÄÍþÐ²Ì¬ÊÆÎ£º¦ÆÀ¹ÀµÈ¡£¿ÉÒÔ˵£¬ATT&CK֪ʶ¿âÔÚÒ»¶¨Ë®Æ½ÉÏÔö½øÁËXDR£¨Extended Detection and Response£©½â¾ö¼Æ»®µÄ¿´·¨³´×÷¡£¶àÔ´¶àάÊý¾ÝÔ´µÄ¼¯³É×Ô¼º²»ÊÇÐÂÏÊÊ£¬µ«ÒÔÕæÊµAPTÇ鱨Çý¶¯£¬²¢ÌõÀí»¯Ó³Éäµ½ÍþвÐÐΪµÄÕ½ÊõºÍÊÖÒÕʵÏÖ²ãÃæ£¬ATT&CK¾ØÕóʵÀý»¯Õ¹Ê¾Á˸߼¶Íþв·À»¤µÄÂäµØË¼Ð÷¡£×ܽáÀ´¿´£¬ATT&CKÇý¶¯ÏµÄÊý¾ÝÈÚºÏΪÍþв·ÀÓù·½´øÀ´ÒÔÏÂеĻúÔµ£º
1¡¢Ôö½øÊý¾Ý¹éÒ»»¯¡¢±¾Ì廯¼°¹ØÁªÐÔÌáÉý¡£ÎÞÂÛÊÇÄÚ²¿¼ì²âÄÜÁ¦ÃüÃû£¬ÕÕ¾ÉÓëÍⲿÍþвÇ鱨¶Ô½Ó£¬ATT&CK¾ØÕóΪÆóÒµ»ò×éÖ¯ÄÚÊý¾ÝºþµÄÊý¾ÝÈÚºÏÌṩÁ˼¼Õ½ÊõÁýͳÌõÀíµÄ¶ÔÆë¼Æ»®¡£»ù±¾µÄ£¬ÀàËÆ¸æ¾¯»òÊÂÎñÓÐÁËÃ÷È·µÄ¹éÀàÌõÀí¡£½ø½×µÄ£¬Êý¾ÝÖÐÒþº¬µÄÊý¾ÝʵÌå¼°Æä¹ØÁª¹ØÏµ£¬Äܹ»ÔÚͳһµÄ¿ò¼ÜÏÂʵÏÖ±¾Ì廯½¨Ä££¬ÎªÖªÊ¶Í¼Æ×µÈ»ùÓÚÍøÂçºÍͼµÄÊý¾Ý½á¹¹¹¹½¨Ìṩ»ù´¡¡£
2¡¢Ôö½øÆÊÎöÄÜÁ¦ÓëÓªÒµµÄ½âñî¡£Öî¶à»úеѧϰËã·¨ÒѾӦÓÃÓÚÍþв¼ì²â¡¢ËÝÔ´µÈ»·½Ú¡£È»¶ø£¬Ðí¶àÊÖÒյײ㼯³ÉÀàËÆµÄÆÊÎöË㷨ȴÐγɿ´ËƲî±ðµÄÓ¦Óüƻ®¡£ÆäÖеÄÊÖÒÕÈßÓàΪÊý¾ÝÆÊÎöÄÜÁ¦µÄ¿ÉÍØÕ¹ÐÔ´øÀ´Æ¿¾±¡£ATT&CK¾ØÕó´Ó¹¥·ÀÊÓ½ÇΪ“Çå¾²ÄÜÁ¦ÖÐ̨”µÄ¹¹½¨ÌṩÁËÐÂ˼Ð÷¡£Í¨ÓÃËã·¨ÄÜÁ¦Äܹ»´Ó¹Å°åµÄÊý¾ÝÆÊÎö¹ÂµºÖÐÁýͳ³öÀ´£¬²¢ÓëÉÏÒ»²ãµÄÇå¾²ÓªÒµÐèÇó½âñî¡£ÀýÈ磬¾µäµÄÐòÁÐÆÊÎöÄ£×Ó¿ÉÓÃÓÚÊÂÎñÕ¹Íû¡¢Òì³£¼ì²âµÈ²î±ðÌõÀíµÄ³¡¾°¡£ÔÚͳһµÄÊý¾ÝºþÖ®ÉÏ£¬ÆÊÎöËã·¨Äܹ»³ä·ÖÄ£¿é»¯£¬ÐγɿɱàÅŵÄŲÓýӿÚÒÔ¹©ÎÞаµÄŲÓÃÓ뼯³É¡£
3¡¢Ôö½øÆÊÎöËã·¨µÄÓïÒ廯¡£Ç·ÓïÒ廯һֱÒÔÀ´¶¼ÊÇÊý¾ÝÇý¶¯Íþв¼ì²âµÄÍ´µã¡£»ùÓÚͳ¼ÆµÄģʽʶ±ðÓëÒò¹ûÆÊÎö£¬ÍùÍùÐèÒªÔÚÊÊÁìÏÈÑé֪ʶµÄÔ¼ÊøÏ£¬²Å»ªË³Ó¦Çå¾²Êý¾ÝµÄÆÊÎöÄ¿µÄ¡£ATT&CKͨ¹ý¾ØÕóµÄÕ½Êõ½×¶Î»®·Ö£¬ÔÚÄ¿µÄ²ã¡¢ÆÊÎö²ãÒÔ¼°Êý¾Ý²ãÉÏ×ÔÈ»µÄÌṩÁËÓÐÃ÷È·ÓïÒåµÄ¹ØÁª¹ØÏµ¡£ÕâÒ»ÓïÒåÔöÇ¿£¬¸øÊý¾ÝÇý¶¯ÍþвÆÊÎöЧ¹ûÌṩÁ˽²¹ÊÊµķ¶±¾£¬ÎªÔËÓªÖ°Ô±ÌṩÁË¿ÉÚ¹ÊÍ¡¢¿ÉÃ÷È·µÄÏßË÷Èë¿Ú¡£

ͼ2 ÈÚºÏATT&CKÓëKillChainµÄ¹¥»÷½¨Ä£[2]
¶þ¡¢Êý¾ÝÍÚ¾òµÄÊÊÓÃÐÔÌôÕ½
ATT&CKÊǹ¥·ÀÌìÏÂÀïµÄÒ»´Î֪ʶ±ê×¼»¯µÄÀ˳±£¬ÒѾÇÐʵµÄÉøÍ¸µ½Çå¾²ÄÜÁ¦Éú³¤µÄ¸÷¸ö½ÇÂä¡£ÎÒÃÇ¿´µ½Óú·¢¶àµÄ¿ò¼ÜÉè¼Æ¡¢½â¾ö¼Æ»®¡¢²úƷʵÏÖÒѾÈÚºÏATT&CKµÄÍ·ÄÔÓë֪ʶ±êÇ©¡£µ±×îÏÈÖ±ÃæATT&CKÇý¶¯ÏÂеÄÊý¾ÝÐÎÊÆ£¬ÔÚ¿´µ½Íþвá÷ÁÔлúÔµµÄͬʱ£¬ÎÒÃÇÒ²·¢Ã÷¸ü´ó¹æÄ£¡¢¸üÖÜÈ«µÄÊý¾ÝÁýÕÖ£¬¸øÇå¾²ÔËÓª´øÀ´È«ÐµÄÌôÕ½¡£ËäÈ»£¬ÕâЩÌôÕ½¾ø´ó²¿·Ö²»ÊÇATT&CKÒýÈëµÄл°Ìâ¡£ATT&CKÒý·¢µÄ¹¥·À˼³±µÄͳһ£¬ºÜºéÁ÷ƽÉ϶ÔÇå¾²ÔËÓªÊý¾ÝÃÎ÷ʵķºÆðÆðµ½ÁËÍÆ²¨ÖúÀ½µÄ×÷Óá£
ʵÖÊÉÏ£¬´ó¹æÄ£Çå¾²ÔËÓªÊý¾ÝÆÊÎöµÄÄÑÌâÀ´×ÔÓÚ¹¥ÊصIJ»Æ½ºâÐÔ¡£³£Ì¬»¯Çå¾²ÔËÓªµÄÄ¿µÄÊÇÔÚºÏÀíµÄͶÈë²ú³ö±ÈÏ£¬Ò»Á¬µÄ¼à¿Ø²¢½µµÍÆóÒµºÍ×éÖ¯µÄϵͳ»¯Ç徲Σº¦¡£Äܹ»ÔÚÌ¬ÊÆ´óÆÁÉÏÕ¹ÏÖ³öÀ´µÄÍþвÇ÷ÊÆ£¬ºÜÄÑÊÊÓÃÓÚ¸ßÒþÄäÐÔ¡¢µÍƵµÄ¸ß¼¶ÍþвµÄá÷ÁÔʹÃü¡£ÔÚ¹¥ÊØÊ§ºâµÄÌõ¼þÔ¼ÊøÏ£¬ATT&CKËÆºõ¸ø³öÒ»¼ÁÁ¼Ò©µÄÅä·½£¬ÄÇôƾ֤Åä·½ÍøÂçºÃÿһζҩ²Ä£¬°¾Ò»°¾¾ÍÄÜÔ¤·À²¡º¦Âð£¿ÍøÂçÇå¾²ÍþвµÄÆÆËðÐÔ£¬ÒªÇó·ÀÓù·½²»¿ÉÇóÖîÐþѧ¡£ÒÔÏ£¬½«´ÓÊý¾Ý½ÓÈë¡¢ÏßË÷·¢Ã÷¡¢ÊÂÎñÖØÐÞÈý¸ö½Ç¶È£¬×ܽáÔÚ̽Ë÷ATT&CK¿ÆÑ§»¯Ó¦ÓÃÖеÄÒªº¦ÐÔÌôÕ½¡£
01Êý¾Ý½ÓÈ룺ϵͳƿ¾±ÓëÊý¾ÝΣº¦

ͼ3 ËÝÔ´Êý¾ÝÆÊÎöϵͳµÄÒ»Ñùƽ³£ÊÖÒÕ¿ò¼Ü[3]
ÈçǰËùÊö£¬Ò»·½Ãæ¸ß¼¶ÍþвµÍƵÇÒ¾ßÓÐÒþÄäÐÔ£¬ÁíÒ»·½ÃæÆóÒµºÍ×éÖ¯ÐèÒªÒ»Á¬¾ÙÐÐΣº¦¹Ü¿Ø¡£Òò´Ë£¬´ÓATT&CK¾ØÕóÁýÕÖÂʵĽǶÈ˼Á¿£¬ËùÐèÊÕÂÞµÄÊý¾ÝÖÖÀà¶à¡¢Êý¾Ý¹æÄ£Òì³£ÖØ´ó¡£ÉÏͼչʾÁËÒ»¸öµä·¶ÖÕ¶ËÍþв¼ì²â´¦Öóͷ£ÏµÍ³µÄ¼Ü¹¹£¬Éæ¼°´ÓÊý¾ÝÊÕÂÞ¡¢ÖÎÀí¡¢¼ì²âµÈ¶à¸ö»·½Ú¡£ÈôÊÇûÓÐÓÐÓõÄÔ¤´¦Öóͷ£»·½Ú£¬µ¥Ì¨Óû§Ö÷»úµÄÒ»Ñùƽ³£Á÷Á¿¡¢ÖÕ¶ËÐÐΪÈÕÖ¾Á¿ÖÁÉÙÌìÌì¿É´ïÊý°ÙÕ××Ö½Ú£¬¸ü²»±ØËµÌṩ·þÎñ×ÊÔ´µÈ¹¦Ð§ÐԽڵ㡣²»Ö¹ÊÇÊý¾ÝÍÌÍÂÁ¿´ó£¬ÎªÁËÖª×ãºÏ¹æÐèÇó£¬Ö§³ÖÊÂÎñËÝÔ´¡¢¹ØÁªµÈÍþвÆÊÎöʹÃü£¬ËùÊÕÂÞµÄÊý¾ÝÍùÍùÐèÒª³¤´ïÊý°ÙÌìµÄ³¤ÆÚ»¯Áô´æ¡£ÕâЩÊý¾ÝµÄÊÕÂÞ¡¢´«Êä¡¢´æ´¢µÈ¸øËãÁ¦¡¢ÍøÂç¡¢Êý¾Ý¿âµÈ¸÷¸öϵͳ»·½Ú´øÀ´ÖØ´óµÄѹÁ¦¡£ÆäÑÜÉúЧ¹û¾ÍÊÇ£¬Ðí¶àÊÕÂÞÄÜÁ¦±»½ûÓ㬴ó×ÚÊý¾ÝÔÚÔ¤ÉèµÄ¼ÛÖµÅжÏÕ½ÂÔϱ»ÌáǰÑïÆú£¬Õâ¿ÉÄܵ¼ÖÂÍþвÏßË÷ºÍÖ¤¾ÝÁ´µÄʱЧ¡£Êý¾Ý±¬Õ¨Ëù±¬·¢µÄÕâЩÏÖʵÎÊÌâ³ÉΪXDRµÈÊÖÒռƻ®Â䵨µÄÒªº¦×è°¡£
±ðµÄ£¬Ö»¹ÜÓÐÕ½ÂÔÉèÖõÄÏÞÖÆ£¬ÖÕ¶Ë¡¢ÍøÂçÊý¾ÝµÄϸÁ£¶ÈÊÕÂÞ£¬ÄÑÃâ»á½«Éæ¼°Óû§Òþ˽£¬»òÕ߯óÒµ½¹µã·þÎñÏà¹ØÃô¸ÐÐÐΪµÈÊý¾ÝÉÏ´«µ½Ôƶ˵ÈÖÐÐÄ»¯Êý¾ÝÖÐÐÄÖС£ÕâÖÖÇå¾²Êý¾ÝÊÕÂÞÒýÈëµÄ°éÉúÊý¾ÝΣº¦£¬½«¶ÔÆäÇå¾²ÄÜÁ¦µÄÂ䵨ÒýÈëеĵ£ÐÄ¡£
02ÏßË÷·¢Ã÷£ºÕÙ»ØÄ£×ÓÓë¸ßÎó±¨ÂÊ
ATT&CK¾ØÕóÖеĴ󲿷ֹ¥»÷ÊÖÒÕÁýͳ¶¼ÊÇÕÙ»ØÕ½ÂÔÇý¶¯µÄ¡£ÈçÏÂͼËùʾ£¬ÊÇMITREËù¸ú×ÙÊÓ²ìµÄ93¸öAPT×é֯ʹÓôÎÊý×î¶àµÄÊ®ÖÖÊÖÒÕ£¨¸ÃÊÖÒÕ»®·ÖÃüÃû»ùÓڸİæÖ®Ç°µÄMITRE¾ØÕó£¬ÉÐδ°üÀ¨×ÓÊÖÒյĿ´·¨£©¡£ÆäÖÐÄܹ»Ö±½Ó¶ÔÓ¦µ½¹¥»÷ÐÐΪµÄÊÖÒÕÐÎò£¬Ö»ÓÐSpearphishing Attachment£¬Credential DumpingºÍObfuscated FilesÕâÈýÀ࣬ÆäËûÆßÀàÊÖÒÕ»®·Öµ¥¶ÀÀ´¿´£¬¶¼ÊÇÕý³£ÍøÂçÐÐΪÓë²Ù×÷¡£ATT&CKµÄÒªº¦Ä¿µÄÔÚÓÚÁýÕÖºÍÕٻأ¬¶ø´ÓÇå¾²ÔËÓªµÄÊÓ½ÇÀ´¿´£¬ÔÚÊÂÎñ¹æÄ£ÅòÕ͵ÄÏÖ×´Ï£¬Îó±¨ÂÊÊÇÒ»¸öºÜÊÇÒªº¦µÄÓÐÓÃÐÔȨºâÖ¸±ê¡£Ò»ÏîÕë¶ÔÈüÃÅÌú¿ËÖն˸澯µÄÆÊÎöÅú×¢£¬ÓÉ34̨»úе´¥·¢µÄ58096Ìõ¸æ¾¯ÖУ¬Óë¼ì²âÄ¿µÄAPT29ÐÐΪÏà¹ØÕæÊµ¸æ¾¯Ö»ÓÐ1104Ìõ£¬¸æ¾¯µÄ¾«¶ÈÖ»ÓÐ1.9%¡£´ó¹æÄ£Î󱨸澯´øÀ´µÄÎ󱍯£ÀÍ£¬»áÒ»Á¬½µµÍÕû¸öÇå¾²ÔËÓªÍŶӵÄÔËתЧÂÊ¡£ËäÈ»£¬³ýÁ˹¥»÷ÊÖÒÕ·ÖÀàÖ®Í⣬ATT&CKÕë¶ÔÿһÖÖÊÖÒÕ£¬¶¼ÌṩÁËÓÐÖ¸µ¼ÒâÒåµÄÔ¤·ÀºÍ¼ì²âÕ½ÂÔ¡£²»¹ý£¬ÕâЩ·ÀÓùÕ½ÂÔµÄÂäʵÈÔÐèÔÚÏÖʵµÄÊý¾ÝÆÊÎöÖÐÊÔ´í¡£

ͼ4 MITRE APT¹ØÁªµÄ³£¼ûÊÖÒÕͳ¼Æ[4]
03ÊÂÎñÖØÐÞ£ºÒ»´Ê¶àÒåÓëÒÀÀµ±¬Õ¨
ATT&CKͨ¹ý½×¶Î»®·Ö£¬¸øÏêϸÊÖÒյĹéÀึÓëÁËÒ»¶¨µÄÓïÒ幨Áª£¬¸øÇå¾²ÍŶӽ²¹ÊÊÂÌṩÁËÏßË÷´®ÁªµÄ·¶±¾¡£È»¶ø£¬´ÓÊý¾ÝÍÚ¾òºÍ¹ØÁªµÄ½Ç¶È£¬ÓÐÁ½¸öÖ÷ÒªµÄÎÊÌâÐèҪ˼Á¿¡£µÚÒ»¸öÎÊÌâÊÇÒ»´Ê¶àÒ壬ÊÇÖ¸Ò»¸öÊÖÒÕ¿ÉÄܺá¿ç¶à¸öÕ½ÊõʵÏÖ£¬²¢ÒÔ²î±ðµÄÁ£¶È·ºÆðÔÚÒ»¶¨µÄÍþвÉÏÏÂÎÄÖС£ÀýÈçT1053׼ʱʹÃü£¨ScheduledTask/Job£©£¬°üÀ¨ÔÚÖ´ÐУ¨Execution£©¡¢³¤ÆÚ»¯£¨Persistence£©ºÍÌáȨ£¨PrivilegeEscalation£©Èý¸öÕ½ÊõÄ¿µÄÖС£ATT&CK½«T1053ÊÖÒÕ»®¶¨ÎªÒ»ÖÖͳһµÄÊÖÒÕ£¬²¢Î´Õë¶ÔÏêϸսÊõ¾ÙÐÐϸÁ£¶ÈµÄÐÎò¡£ÕâʵÖÊÉÏÊÇÓÉATT&CKµÄÊÖÒÕÁýͳÌõÀí¾öÒéµÄ£¬È»¶øÕâ¸øÊý¾ÝÆÊÎöʹÃü´øÀ´ÐµÄÌôÕ½——ÐèÒª½â¾ö³äÇå³þÈ·ÊÖÒÕ´¥·¢µÄÉÏÏÂÎÄ£¬²¢¸¶Óë¸ÃÊÖÒÕÃ÷È·µÄÕ½ÊõÓïÒå¡£

ͼ5 APT 29¹¥»÷ÊÂÎñËÝÔ´Êý¾Ýͼ[4]
µÚ¶þ¸öÎÊÌâÊÇÒÀÀµ±¬Õ¨¡£Õâ°üÀ¨Á½¸öÌõÀí£¬µÚÒ»¸öÌõÀíÊÇATT&CKµÄÕ½ÊõÄ£×Ó²»ÊÇÒò¹ûÄ£×Ó£¬Ò²²»¾ßÓÐͳ¼ÆÒâÒå¡£ÎÒÃÇ¿ÉÒÔ´ÓMITREÌṩµÄAPTʵÀýÖп´µ½ÏêϸµÄ¼¼Õ½ÊõÖ´ÐÐÊý¾ÝÁ÷¡£È»¶ø£¬ÔÚÏÖʵ¼ì²â¡¢ËÝÔ´ÆÊÎöÖУ¬¼¼Õ½ÊõµÄÌø×ªÊǾØÕóÖеĶàÕ½ÊõÖ®¼ä¡¢µ¥Õ½ÊõÖ®ÄڵĶàÖÖÊÖÒռƻ®µÄÅÅÁÐ×éºÏÎÊÌ⣬ÔÚÈκÎÌØ¶¨³¡¾°ºÍÏÖÕæÏàÐÎÖеĸ߼¶ÍþвÐÐΪÐòÁÐÊÇÆæÒìµÄ£¬¼ÍÂÉÐÔÄÑÒÔ²¶»ñ¡£µÚ¶þ¸öÌõÀíÊÇÔÚϸÁ£¶ÈµÄËÝÔ´Êý¾Ý²ãÃæ£¨Provenance£©£¬Ïֽ׶εÄÊý¾ÝÊÕÂÞÔÚÒ»¶¨µÄ×ÊÔ´ÏÞÖÆÏ£¬ÄÑÒÔϸÄåÃè»æÐÅϢת´ïÁ÷¡£ÏñÎļþ²Ù×÷¡¢ÍøÂçÊäÈë¡¢Àú³Ì½¨ÉèµÈ£¬±£´æÒ»¶Ô¶à¡¢¶à¶Ô¶àµÄ·¾¶ÒÀÀµÎÊÌâ¡£ÓÉÓÚ¸ÃÌõÀíÊý¾ÝµÄϸÁ£¶ÈÌØÕ÷£¬ÒÀÀµ±¬Õ¨Ö±½Ó¼Ó¾çÁËÊý¾Ý´æ´¢¡¢¼ì²â¡¢ËÝÔ´µÈ¸÷¸ö»·½ÚµÄÊÖÒÕÄѶȡ£
Èý¡¢×ܽá
´ÓÇå¾²ÔËÓªµÄʵսÀ´¿´£¬MITRE ATT&CK´ÓÊý¾Ý¹æ·¶ÐÔ¡¢ÄÜÁ¦Áýͳ¡¢ÓïÒåÔöÇ¿µÈ¶à¸ö·½Ãæ¸øÍþв½¨Ä£ÓëÆÊÎöÁìÓò´øÀ´Ð»úÔµ¡£È»¶ø£¬ATT&CKÒ²ÌÓ²»¹ýÇå¾²ÔËÓª´ó¹æÄ£Êý¾ÝÆÊÎöÍÚ¾òµÄÊÊÓÃÐÔÃüÌâ¡£±¾ÎÄ×ܽáÁ˶à¸öÌõÀíÖУ¬ÓëATT&CKÏà¹ØµÄÊý¾ÝÍÚ¾òÌôÕ½£¬ÒÔÆÚÓëÁÐλ¶ÁÕß·ÖÏíÊý¾ÝÓëÖÇÄÜÇý¶¯Çå¾²ÔËÓªµÄδÀ´Éú³¤Æ«Ïò¡£
²Î¿¼×ÊÁÏ
[1] MITREATT&CK Roadmap
[2]https://sgros-students.blogspot.com/2019/01/mitre-att-and-unified-kill-chain.html¡¢
[3]Threat Detection and Investigationwith System-level Provenance Graphs: A Survey
[4]Tactical ProvenanceAnalysis for Endpoint Detection and Response Systems¡·

¾ÅÓÎÀϸçÔÆ





