soc2016 - the investigation labyrinth

28
The Investigat ion Labyrinth Chris Sanders Security Onion Con 2016

Upload: chrissanders88

Post on 13-Jan-2017

619 views

Category:

Technology


1 download

TRANSCRIPT

Page 1: SOC2016 - The Investigation Labyrinth

TheInvestigation Labyrinth

Chris SandersSecurity Onion Con 2016

Page 2: SOC2016 - The Investigation Labyrinth

Chris Sanders (@chrissanders88)

Find Evil @ FireEye Founder @ Rural Tech

Fund PhD Researcher GSE # 64 BBQ Pit Master Author:

Practical Packet Analysis Applied NSM

Page 3: SOC2016 - The Investigation Labyrinth

Agenda Era of Analysis DFIR Cognitive Revolution Researching the Investigation Process Data, Data, and more Data

The economics of NSM are not in our favor – how can we study the investigation process

to make it more efficient?

Page 4: SOC2016 - The Investigation Labyrinth

Economics of Security“If you want to understand the world of nature, master physics. If you want to understand the world of man, master economics.” - Taufiq Rashid

High Demand

for Security Expertise

Low Supply of Security

Practitioners

Expertise

Services

Software

Page 5: SOC2016 - The Investigation Labyrinth

Evolution of NSM “The profession

[security] is so nascent that the how-tos have not been fully realized even by the people who have the knowledge.”

Every thought-based profession goes through a cognitive crisis and revolution. Ours is coming.

Analysis Era

Collecton Era

Detection Era

Page 6: SOC2016 - The Investigation Labyrinth

Symptoms of a Cognitive Crisis1. Demand for expertise greatly

outweights supply2. Most information cannot be trusted or

validated3. Inability to mobilize and tackle big

systemic issues

Page 7: SOC2016 - The Investigation Labyrinth

The Cognitive Revolution in DFIR1. Understand the processes

used to perform investigations and draw conclusions

2. Develop repeatable methods and techniques for performing investigations

3. Build and advocate training that teaches analysts how to think about investigations, not just how to use tools.

Page 8: SOC2016 - The Investigation Labyrinth

Investigations as Mental Labyrinths The investigation is

the core construct of information security.

At a high level, an investigation is a series of decisions that begets other decisions.

Defenders don’t always know if they’ve taken the correct path.

Page 9: SOC2016 - The Investigation Labyrinth

Navigating the Labyrinth

Alert

OSINT

Reputation

File Hash

Sandbox Behaviors

AV Detections

(VT)

Imphash More File Hashes

Friendly Host

Network PCAP

Host

Windows Logs

Security Log

System Log

App LogRegistry

File SystemHostile

Host NetworkPCAP

Flow

Page 10: SOC2016 - The Investigation Labyrinth

Studying the Investigation Process

Goal: Increase Accuracy Decrease Time

How do you study something human thought?

Challenges: Creating unique

investigation scenarios takes time

There is no universal set of tooling

Page 11: SOC2016 - The Investigation Labyrinth

A Scenario-Based Approach to Investigation Analysis

Create a tool-agnostic investigation simulator

Make it portable and self contained Seed it with investigation scenarios

where one variable can be addressed at a time

Allow it to log investigator actions and output a log of decisions being made

Page 12: SOC2016 - The Investigation Labyrinth
Page 13: SOC2016 - The Investigation Labyrinth

Additional Data Sources

Page 14: SOC2016 - The Investigation Labyrinth

Case StudyAnalyzing the Flow of

the Investigation

Page 15: SOC2016 - The Investigation Labyrinth

The Compromise1. Victim visits friendly

website2. Redirect to EK landing page3. Download flash exploit4. Exploit is successful and

ransomware file downloads5. Ransomware installs and

executes6. Ransomware begins C2

communication

Page 16: SOC2016 - The Investigation Labyrinth

What data did analysts look at first?

72%16%

12%

Observed

PCAP FlowOSINT

Data Suggests: Analysts prefer a higher context data set…

…even if other data sets are available …even if lower context data sets can lead to a resolution.

Analysts don’t fully understand their own techniques

49%28%

23%

Reported

PCAP FlowOSINT

Page 17: SOC2016 - The Investigation Labyrinth

Did the first move affect analysis speed?

Data Suggests: While PCAP provides richer context, it may slow down the

investigation if that’s where you start Starting with a lower context data source can increase

speed when working with higher context data

PCAP Flow OSINT

16

10 9

PCAP Flow OSINT

27

13 13

Avg Time to Close Weighted Time to Close

Page 18: SOC2016 - The Investigation Labyrinth

What happens when Bro data replaces PCAP?

46%

25%

29%

Observed (Bro)

Bro Flow OSINT

72%

16%

12%

Observed (PCAP)

PCAP Flow OSINT

Page 19: SOC2016 - The Investigation Labyrinth

What happens when Bro data replaces PCAP?

PCAP Flow OSINT

16

10 9

Avg Time to Close (PCAP)

Bro Flow OSINT

10 10 11

Avg Time to Close (Bro)

Data Suggests: Better organization of high context data

sources can yield improvements in analysts performance

Page 20: SOC2016 - The Investigation Labyrinth

What data sources were viewed most and least frequently?

Data Suggests: Network data is used more frequently than host data…

…even when host data can be used exclusively to resolve. …even when easy access is provided to host sources.

Revisting data is more prevalent on higher context data sources

PCAP Flo

wOSIN

T

Host FS

OS Log

s

Memory

Data Sources Viewed Data Sources Revisited

PCAP84%

Flow11%

OSINT5%

Page 21: SOC2016 - The Investigation Labyrinth

How many steps were taken to make a disposition judgement?

Data Suggests: At some point, the number of data sources you

investigate impacts the speed of the investigation Understanding where data exists and when to use it can

impact analysis speed

6-10 11-15 16-20 21-250

5

10

15

6

129

3

Number of Steps

6-10 11-15 16-20 21-2505

1015202530

9 12 14

24

Avg Time to Close

Page 22: SOC2016 - The Investigation Labyrinth

Did analysts investigate friendly or hostile systems first?

9%

91%

Observed

Friendly Hostile

Data Suggests: Analysts are more compelled to investigate unknown external

threats than internal systems Analysts don’t fully understand their own techniques

41%59%

Friendly

Friendly Hostile

Page 23: SOC2016 - The Investigation Labyrinth

Do analysts seek to prove or disprove the alert?

Data Suggests: Analysts are almost always seek to prove an alert...

...despite the fact that disproving it is usually faster.

Prove vs. Disprove

Prove88%

Disprove12%

Prove Disprove05

101520

19

8

Avg Time to Close

Page 24: SOC2016 - The Investigation Labyrinth

Case StudyWhat separates

novice and expert analysts?

Page 25: SOC2016 - The Investigation Labyrinth

Mapping the Investigation Sample:

Novice and expert analysts Methodology:

30 case studies Stimulated recall interviews Focus on individual investigations of

varying types Perform key phrase anlayis – analyze

results

Page 26: SOC2016 - The Investigation Labyrinth

Key Phrase Mapping Dual Process Theory

Intuition: Implicit, inconscious, fast Reflection: Explicit, controlled, slow

IntuitionExperimentation

RestructuringImaginationIncubation

MetacognitionEvaluation

Goal SettingMaking Plans

ReflectionAnalytically

Viewing DataRule-Based Reasoning

Considering Alternatives

Page 27: SOC2016 - The Investigation Labyrinth

Results

Expe

rimen

tation

Restruc

turing

Imag

inatio

n

Incub

ation

Evalu

ation

Goal S

etting

Making

Plan

s

Novices Experts

Intuition Metacognition Reflection

Page 28: SOC2016 - The Investigation Labyrinth

Thank You!

Mail: [email protected]: @chrissanders88

Blog: chrissanders.org