The following OSINT related CHATGPT query approach was posted by a rockstar OSINT analyst on LinkedIn.
In his example he used it to extract information from a regular news article (non APT related). I thought what if I could leverage it to get a quick cheatsheet/summary of a fairly complex APT analysis paper in case I ever needed it.
NOTE: No harming of Mandiant or the Russian GRU took place for constructing this example.
Steps:
1. Find your APT or Technical Report – this example used this one: https://www.mandiant.com/resources/blog/cyber-operations-russian-vulkan
2. Enter the core PROMPT – Example here but you can modify as needed:
Extract named entities from the following text and create a table with columns for the entity name, type, description, TTP’s and a simplified UUID, and a links column for connections between entities. Add a new column with a UUID for each entity, and add an additional column for links between entries in order to form a network analysis – (Paste entire text)
NOTE: You usually can just copy and paste the entire article without trying to clean it up or extract “just the text”)
3. Take the output and dump to either WORD or PDF to create your Summary Quick Cheat Sheet!
Example output from above steps: (NOTE: the format looks much better in PDF/WORD format, Blogger has limitations in this area to say the least)
Entity Name |
Type |
Description |
TTP’s |
Simplified UUID |
Links |
Mandiant |
Organization |
Cybersecurity firm involved in researching Russian cyber |
Research, analysis, threat intelligence |
1015f9c5-5a1a-43da-a97f-78e4603871a1 |
|
Russian Ministry of Defense |
Government Agency |
Russian government agency responsible for overseeing and |
Defense contracting, military operations |
3b3d7d73-9dd0-45e9-ae6a-7c1b13a0a8da |
|
NTC Vulkan |
Company |
Russian IT contractor based in Moscow working on contracts |
IT contracting, project development |
74e5fced-5509-470c-9b76-6b22050f51b5 |
|
GRU Unit 74455 |
Military Unit |
Also known as Sandworm Team, a part of the |
Cyber espionage, IO, OT attacks |
2a9a9a3a-5e5f-4b91-b11b-3ed3b735 |
|
Entity Name |
Type |
Description |
TTP’s |
Simplified UUID |
Links |
Sandworm Team |
Alias |
Alias for GRU Unit 74455 |
Cyber espionage, IO, OT attacks |
2a9a9a3a-5e5f-4b91-b11b-3ed3b735 |
GRU Unit 74455 |
Papertrail Media |
Media Outlet |
Media outlet involved in the research and |
Reporting, analysis |
a18d4d77-4c3b-4f4d-a9d1-19af8e3f2a62 |
Mandiant |
Der Spiegel |
Media Outlet |
Media outlet involved in the research and |
Reporting, analysis |
922fbffb-14a8-4e1e-97fd-9fd2f933569b |
Mandiant |
Le Monde |
Media Outlet |
Media outlet involved in the research and |
Reporting, analysis |
c01bb0d0-7d17-4a66-8cb0-cf65ac9c9e39 |
Mandiant |
Washington Post |
Media Outlet |
Media outlet involved in the research and |
Reporting, analysis |
40e9d541-00e8-4f52-96aa-31bde1550f6d |
Mandiant |
Scan |
Project/Tool |
A comprehensive framework likely used to |
Large-scale data collection, database |
8d2e3a56-8736-42d4-9ab1-4434bc4f70a4 |
GRU Unit 74455, |
Amesit (Alt: Amezit) |
Project/Tool |
A framework used to control the online |
Information confrontation, psychological |
6c90e10d-4a4a-4e4a-90db-6ad2a6edc39e |
Krystal-2B |
Krystal-2B |
Project/Tool |
A training platform for exercising |
Simulation of coordinated IO/OT attacks |
f1b83424-5e47-484a-8fc1-50a565df6d34 |
Amesit (Alt: Amezit) |
NTC Vulkan |
Russian IT Contractor |
A Russian IT contractor based in Moscow, |
Cyber and IO operations, potentially in |
e56d2c18-3a8e-49a1-98ed-20f0ee788e1c |
Russian Ministry of |
Russian Ministry of |
Government Agency |
The executive body responsible for |
Contracting projects for cyber and information |
59a9a6c8-6b47-4c42-965b-c1076a8c230e |
NTC Vulkan, GRU Unit |
INCONTROLLER |
Tool/Framework |
A tool designed to support parameter changes |
Parameter changes in OT environments |
2a13cfd0-826c-432c-a87f-8f0f526b23fd |
Krystal-2B, Amesit |
|
|||||
Mandiant |
Organization |
Cybersecurity firm involved in researching Russian cyber |
Research, analysis, threat intelligence |
1015f9c5-5a1a-43da-a97f-78e4603871a1 |
|
Russian Ministry of Defense |
Government Agency |
Russian government agency responsible for overseeing and |
Defense contracting, military operations |
3b3d7d73-9dd0-45e9-ae6a-7c1b13a0a8da |
|
NTC Vulkan |
Company |
Russian IT contractor based in Moscow working on contracts |
IT contracting, project development |
74e5fced-5509-470c-9b76-6b22050f51b5 |
|
GRU Unit 74455 |
Military Unit |
Also known as Sandworm Team, a part of the |
Cyber espionage, IO, OT attacks |
2a9a9a3a-5e5f-4b91-b11b-3ed3b735 |
|
Entity Name |
Type |
Description |
TTP’s |
Simplified UUID |
Links |
Sandworm Team |
Alias |
Alias for GRU Unit 74455 |
Cyber espionage, IO, OT attacks |
2a9a9a3a-5e5f-4b91-b11b-3ed3b735 |
GRU Unit 74455 |
Papertrail Media |
Media Outlet |
Media outlet involved in the research and |
Reporting, analysis |
a18d4d77-4c3b-4f4d-a9d1-19af8e3f2a62 |
Mandiant |
Der Spiegel |
Media Outlet |
Media outlet involved in the research and |
Reporting, analysis |
922fbffb-14a8-4e1e-97fd-9fd2f933569b |
Mandiant |
Le Monde |
Media Outlet |
Media outlet involved in the research and |
Reporting, analysis |
c01bb0d0-7d17-4a66-8cb0-cf65ac9c9e39 |
Mandiant |
Washington Post |
Media Outlet |
Media outlet involved in the research and |
Reporting, analysis |
40e9d541-00e8-4f52-96aa-31bde1550f6d |
Mandiant |
Scan |
Project/Tool |
A comprehensive framework likely used to |
Large-scale data collection, database |
8d2e3a56-8736-42d4-9ab1-4434bc4f70a4 |
GRU Unit 74455, |
Amesit (Alt: Amezit) |
Project/Tool |
A framework used to control the online |
Information confrontation, psychological |
6c90e10d-4a4a-4e4a-90db-6ad2a6edc39e |
Krystal-2B |
Krystal-2B |
Project/Tool |
A training platform for exercising |
Simulation of coordinated IO/OT attacks |
f1b83424-5e47-484a-8fc1-50a565df6d34 |
Amesit (Alt: Amezit) |
NTC Vulkan |
Russian IT Contractor |
A Russian IT contractor based in Moscow, |
Cyber and IO operations, potentially in |
e56d2c18-3a8e-49a1-98ed-20f0ee788e1c |
Russian Ministry of |
Russian Ministry of |
Government Agency |
The executive body responsible for |
Contracting projects for cyber and information |
59a9a6c8-6b47-4c42-965b-c1076a8c230e |
NTC Vulkan, GRU Unit |
INCONTROLLER |
Tool/Framework |
A tool designed to support parameter changes |
Parameter changes in OT environments |
2a13cfd0-826c-432c-a87f-8f0f526b23fd |
Krystal-2B, Amesit |
The projects contracted by NTC Vulkan provide insight into the
investment of Russian intelligence services in developing capabilities to
deploy more efficient operations within the beginning of the attack lifecycle,
a piece of operations often hidden from view. A framework like the one
suggested in the Scan project illustrates how the GRU may be trying to enable
fast-paced operations with high coordination among regional units. A
once-segmented GRU cyber operation may become streamlined and more efficient
using a framework like Scan.
These projects also show interest in holistic operations to conduct
information control and/or confrontation and amplify the psychological effects
of cyber operations. For example, Amesit and Krystal-2B demonstrate a high
value placed on the psychological impact of offensive cyber attacks,
specifically OT operations, by highlighting the role of information operations
in determining the impact of an ICS incident. The combination of different
tactics in cyber operations is familiar to Russian cyber operations: an early
example is the multifaceted BLACKENERGY operation in 2015 leading to disruption
of energy infrastructure in Ukraine. We have also seen the combination of IO
and disruptive cyberattacks throughout the Ukraine war.
The documentation from Krystal-2B and Amesit also displays
interest in critical infrastructure targets, particularly energy utilities and
oil and gas, but also water utilities and transportation systems, including
rail, sea, and air. As we continue to observe the intensification of threat
activity from Russian-sponsored actors in parallel to the invasion in Ukraine,
defenders should remain aware of the capabilities and priorities reflected in
these documents to be prepared for protecting critical infrastructure and
services