D. Burke

TechnoSavage

View on GitHub

Trooper Walkthrough (easy)

Q: What kind of phishing campaign does APT X use as part of their TTPs?

spear-phishing emails

Q: What is the name of the malware used by APT X?

USBferry

Q: What is the malware’s STIX ID?

malware--5d0ea014-1ce9-5d5c-bcc7-f625a07907d0

Q: With the use of a USB, what technique did APT X use for initial access?

Replication Through Removable Media

Q: What is the identity of APT X?

Tropic Trooper

Q: On OpenCTI, how many Attack Pattern techniques are associated with the APT?

39

Q: What is the name of the tool linked to the APT?

BITSAdmin

Q: Load up the Navigator. What is the sub-technique used by the APT under Valid Accounts?

Local Accounts

Q: Under what Tactics does the technique above fall?

Initial Access, Persistence,  Defense Evasion and Privilege Escalation

Q: What technique is the group known for using under the tactic Collection?

Automated Collection