expand MITRE ATT&CK technique coverage mapping

This commit is contained in:
Adir Shitrit
2025-11-08 11:49:27 +02:00
parent cb9e072655
commit a90a6d8091

View File

@@ -5,6 +5,7 @@ Ghost detection engine coverage mapped to MITRE ATT&CK framework techniques.
## Process Injection (T1055) ## Process Injection (T1055)
### T1055.001 - Dynamic-link Library Injection ### T1055.001 - Dynamic-link Library Injection
- **Detection**: Hook-based injection detection (`hooks.rs`) - **Detection**: Hook-based injection detection (`hooks.rs`)
- **Indicators**: - **Indicators**:
- SetWindowsHookEx API monitoring - SetWindowsHookEx API monitoring
@@ -13,6 +14,7 @@ Ghost detection engine coverage mapped to MITRE ATT&CK framework techniques.
- **Confidence**: High (0.8-0.9) - **Confidence**: High (0.8-0.9)
### T1055.002 - Portable Executable Injection ### T1055.002 - Portable Executable Injection
- **Detection**: Shellcode pattern detection (`shellcode.rs`) - **Detection**: Shellcode pattern detection (`shellcode.rs`)
- **Indicators**: - **Indicators**:
- PE headers in private memory regions - PE headers in private memory regions
@@ -21,6 +23,7 @@ Ghost detection engine coverage mapped to MITRE ATT&CK framework techniques.
- **Confidence**: High (0.7-0.9) - **Confidence**: High (0.7-0.9)
### T1055.003 - Thread Execution Hijacking ### T1055.003 - Thread Execution Hijacking
- **Detection**: Thread analysis (`thread.rs`, `detection.rs`) - **Detection**: Thread analysis (`thread.rs`, `detection.rs`)
- **Indicators**: - **Indicators**:
- Threads with unusual start addresses - Threads with unusual start addresses
@@ -29,6 +32,7 @@ Ghost detection engine coverage mapped to MITRE ATT&CK framework techniques.
- **Confidence**: Medium (0.5-0.7) - **Confidence**: Medium (0.5-0.7)
### T1055.004 - Asynchronous Procedure Call ### T1055.004 - Asynchronous Procedure Call
- **Detection**: Memory pattern analysis - **Detection**: Memory pattern analysis
- **Indicators**: - **Indicators**:
- Suspicious memory layout changes - Suspicious memory layout changes
@@ -37,6 +41,7 @@ Ghost detection engine coverage mapped to MITRE ATT&CK framework techniques.
- **Confidence**: Medium (0.4-0.6) - **Confidence**: Medium (0.4-0.6)
### T1055.012 - Process Hollowing ### T1055.012 - Process Hollowing
- **Detection**: Comprehensive hollowing detection (`hollowing.rs`) - **Detection**: Comprehensive hollowing detection (`hollowing.rs`)
- **Indicators**: - **Indicators**:
- Unmapped main executable image - Unmapped main executable image
@@ -49,6 +54,7 @@ Ghost detection engine coverage mapped to MITRE ATT&CK framework techniques.
## Defense Evasion (TA0005) ## Defense Evasion (TA0005)
### T1027 - Obfuscated Files or Information ### T1027 - Obfuscated Files or Information
- **Detection**: Entropy analysis in shellcode detector - **Detection**: Entropy analysis in shellcode detector
- **Indicators**: - **Indicators**:
- High entropy regions (>7.0 Shannon entropy) - High entropy regions (>7.0 Shannon entropy)
@@ -56,11 +62,13 @@ Ghost detection engine coverage mapped to MITRE ATT&CK framework techniques.
- **Confidence**: Medium (0.6-0.8) - **Confidence**: Medium (0.6-0.8)
### T1055 - Process Injection (General) ### T1055 - Process Injection (General)
- **Detection**: Multi-layered approach across all modules - **Detection**: Multi-layered approach across all modules
- **Indicators**: Combination of all injection-specific indicators - **Indicators**: Combination of all injection-specific indicators
- **Confidence**: Varies by technique - **Confidence**: Varies by technique
### T1036 - Masquerading ### T1036 - Masquerading
- **Detection**: Process metadata analysis - **Detection**: Process metadata analysis
- **Indicators**: - **Indicators**:
- Process name/path mismatches - Process name/path mismatches
@@ -70,6 +78,7 @@ Ghost detection engine coverage mapped to MITRE ATT&CK framework techniques.
## Execution (TA0002) ## Execution (TA0002)
### T1106 - Native API ### T1106 - Native API
- **Detection**: Memory pattern analysis, syscall indicators - **Detection**: Memory pattern analysis, syscall indicators
- **Indicators**: - **Indicators**:
- Direct syscall usage patterns - Direct syscall usage patterns
@@ -77,12 +86,14 @@ Ghost detection engine coverage mapped to MITRE ATT&CK framework techniques.
- **Confidence**: Medium (0.5-0.7) - **Confidence**: Medium (0.5-0.7)
### T1055 - Process Injection ### T1055 - Process Injection
- **Detection**: Primary focus of Ghost detection engine - **Detection**: Primary focus of Ghost detection engine
- **Coverage**: Comprehensive across all sub-techniques - **Coverage**: Comprehensive across all sub-techniques
## Detection Methodology ## Detection Methodology
### Heuristic Analysis ### Heuristic Analysis
1. **Memory Layout Analysis** 1. **Memory Layout Analysis**
- RWX region detection - RWX region detection
- Memory gap analysis - Memory gap analysis
@@ -99,6 +110,7 @@ Ghost detection engine coverage mapped to MITRE ATT&CK framework techniques.
- API usage fingerprints - API usage fingerprints
### Confidence Scoring ### Confidence Scoring
- **0.9-1.0**: Very High - Multiple strong indicators - **0.9-1.0**: Very High - Multiple strong indicators
- **0.7-0.8**: High - Clear malicious patterns - **0.7-0.8**: High - Clear malicious patterns
- **0.5-0.6**: Medium - Suspicious but may be legitimate - **0.5-0.6**: Medium - Suspicious but may be legitimate
@@ -121,17 +133,20 @@ Ghost detection engine coverage mapped to MITRE ATT&CK framework techniques.
## Future Enhancements ## Future Enhancements
### High Priority ### High Priority
- **T1055.008** - Ptrace System Calls (Linux) - **T1055.008** - Ptrace System Calls (Linux)
- **T1055.009** - Proc Memory (Linux) - **T1055.009** - Proc Memory (Linux)
- **T1055.013** - Process Doppelgänging - **T1055.013** - Process Doppelgänging
- **T1055.014** - VDSO Hijacking (Linux) - **T1055.014** - VDSO Hijacking (Linux)
### Medium Priority ### Medium Priority
- **T1134** - Access Token Manipulation - **T1134** - Access Token Manipulation
- **T1548.002** - Bypass User Account Control - **T1548.002** - Bypass User Account Control
- **T1562.001** - Disable or Modify Tools - **T1562.001** - Disable or Modify Tools
### Research Areas ### Research Areas
- Machine learning-based anomaly detection - Machine learning-based anomaly detection
- Graph analysis of process relationships - Graph analysis of process relationships
- Timeline analysis for attack progression - Timeline analysis for attack progression