Jasper Alblas
Jasper Alblas
Welcome to this walkthrough of the Open CTI Room on TryHackMe. In this room we will learn about the concepts and usage of OpenCTI, an open-source threat intelligence platform.
Room URL: https://tryhackme.com/r/room/opencti
This room is part of the SOC Level 1 Path.
I am making these walkthroughs to keep myself motivated to learn cyber security, and ensure that I remember the knowledge gained by these challenges on HTB and THM.
Join me on learning cyber security. I will try and explain concepts as I go, to differentiate myself from other walkthroughs.
Now, let’s move on!
This room will cover the concepts and usage of OpenCTI, an open-source threat intelligence platform. The room will help you understand and answer the following questions:
Prior to going through this room, we recommend checking out these rooms as prerequisites:
Answer: No answer needed
OpenCTI is an open-source platform designed for managing Cyber Threat Intelligence (CTI). It enables organizations to store, analyze, visualize, and present information on threat campaigns, malware, and Indicators of Compromise (IOCs).
Key Features:
Answer: No answer needed
Data Model:
OpenCTI adopts the STIX2 standards (Structured Threat Information Expression) as its primary schema for structuring data. STIX standardizes threat intelligence into entities and relationships, making it easier to trace the origins of information.
Architecture Overview:
The platform integrates a range of services and components to support its operations:
Connector Classes:
For more details on configuring connectors and the data schema, refer to the OpenCTI documentation.
Answer: No answer needed.
With the introduction and data model theory out of the way, it is time for some practical experience. Yay!
Follow along with the task by launching the attached machine and using the credentials provided; log in to the OpenCTI Dashboard via the AttackBox attached to the room.
Username: info@tryhack.io
Password: TryHackMe1234
Dashboard:
The OpenCTI dashboard displays visual widgets summarizing ingested threat data. It highlights the total number of entities, relationships, reports, and observables, as well as 24-hour changes, providing an overview of the platform’s current state.
Key Tabs and Features:
OpenCTI’s structured design and robust categorization streamline the analysis and investigation of threat intelligence for cybersecurity professionals.
Before moving on, make sure to login into the OpenCTI Dashboard with the provided credentials:
Go into the Arsenal tab under the Knowledge section. This tab lists all items related to an attack and any legitimate tools identified from the entities.
After making sure that you have Malware selected at the top, try searching for 4H RAT, and result number 2 lists the answer: Putter Panda.
You can read more on the group here:
https://attack.mitre.org/groups/G0024
Answer: Putter Panda
This time, look at the Attack Patterns screen of the Arsenal section. Here we can search for Command-Line Interface:
This finds T0807, which is a ATT&CK technique: https://attack.mitre.org/techniques/T0807/
‘
If you click into the search result, you will find the previously shown result. In the top rights is the kill chain phase.
Answer: execution-ics
Go into Activities, and have a look around. You will end up finding Indicators of Compromise under the Observations tab, and more specifically in the Indicators view.
They ask for the tab, which means the answer is Observations.
Answer: Observations
As before, go into the the Knowledge menu, and option the Arsenal tab. Here you can search for the Cobalt Strike malware.
Click on the result and you will go into the Overview tab of the Malware detail page.
To answer the question we need to find info on intrusion sets.
An Intrusion Set refers to a grouping of consistent malicious activities, based on shared tactics, techniques, and objectives.
We can find the information we need under the Knowledge tab, followed by clicking on Intrusion sets in the right menu.
Here we find a all the intrusion sets related to Cobalt Strike. Only two have a “Good” confidence: CopyKittens and FIN7.
Answer: CopyKittens, FIN7
An easy one. This one is found under the basic information in the Overview tab. The answer is The MITRE Corporation.
Answer: The MITRE Corporation
Time for a scenario. Let’s have fun!
As a SOC analyst, you have been tasked with investigations on malware and APT groups rampaging through the world. Your assignment is to look into the CaddyWiper malware and APT37 group. Gather information from OpenCTI to answer the following questions.
Go to the Arsenal Tab under Knowledge, and search for CaddyWiper:
Click on the search result. Now go into the Analysis view and you will find different date entries:
2022/03/15 was the first date where CaddyWiper was reported on.
Answer: 2022/03/15
If you go back to the Overview view, and scroll a bit down, you come across a variety of Attack Patterns which are related to CaddyWiper. One of them is Native API.
Note: You could also have seen this answer by pressing “Attack Patterns” on the right menu.
Answer: Native API
Continue by clicking on the Native API Attack Pattern, which brings us to the detail page on this attack technique.
Now move into the Knowledge view by clicking on the button in the top menu.
Here you can read that the technique is related to 113 types of Malware.
Answer: 113
This question can be answered by clicking on Tools in the right menu.
You will see all the tools which have used the Native API technique. Three of them were used in 2016. ShimRatReporter, BloodHound and Empire.
Answer: BloodHound, Empire, ShimRatReporter
The room earlier mentioned that APTs are found under Threats > Intrusions Sets.
Intrusion Sets: An array of TTPs, tools, malware and infrastructure used by a threat actor against targets who share some attributes. APTs and threat groups are listed under this category on the platform due to their known pattern of actions.
Click on the Threats tab under Knowledge, and search for APT37 while on the Intrusion Sets view.
APT37 is shown, and in the description we can see the group is North Korean.
Answer: North Korea
Click on the group and press Attack patterns in the right menu. We get shown at ATT&CK matrix which the different techniques used in each step of the attack chain.
Two of them are highlighted for APT37 under Initial Access: Drive-by-Compromise and Phishing. Click on each and you will find the ATT&CK IDs for each technique: T1189 for Drive-by-Compromise and T1566 for Phishing.
Answer: T1189, T1566
Fantastic work on going through and completing the OpenCTI room.
In this room, we looked at the use of the OpenCTI platform when it comes to processing threat intel and assisting analysts in investigating incidents. Check out the documentation linked within the room to get more information about OpenCTI and the different tools and frameworks used.
Answer: No answer needed
Good job on finishing this room. I actually had a lot of fun making this walkthrough, and solving the questions. OpenMTI is a great tool that I am sure we will use a lot in the future!
Come back soon for more walkthroughs of rooms on TryHackMe and HackTheBox.
You are welcome to comment this post, and please share with friends 🙂
I would be even more grateful if you support me by buying me a cup of coffee:
I learned a lot through HackTheBox’s Academy. If you want to sign up, you can get extra cubes, and support me in the process, if you use the following link:
[…] TryHackMe: OpenCTI Walkthrough (SOC Level 1) […]