CTI STIX Subcommittee

 View Only
Expand all | Collapse all

STIX Sightings

  • 1.  STIX Sightings

    Posted 10-29-2015 09:39
    Dear list, My view on sightings: Threat Intelligence is in part about moving unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information, the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention). The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if – or to what extent – they have deference, defeat or preventive measures in place. Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings: Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication) Sightings are either produced by machines or by humans. In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting. In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports, etc. In part because you can’t ASSUME that the full context is available to be sighted. Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence. Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the way I describe above – with success.  I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0.  Best regards, Joep


  • 2.  RE: STIX Sightings

    Posted 10-29-2015 13:23
    A “negative sighting”?  Mind = Blown!   Can you talk about that some more?    From: cti-stix@lists.oasis-open.org [mailto:cti-stix@lists.oasis-open.org] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 5:39 AM To: cti-stix@lists.oasis-open.org Subject: [cti-stix] STIX Sightings   Dear list,   My view on sightings:   Threat Intelligence is in part about moving unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information, the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention).   The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if – or to what extent – they have deference, defeat or preventive measures in place.   Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings: Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication) Sightings are either produced by machines or by humans. In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting. In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports, etc. In part because you can’t ASSUME that the full context is available to be sighted. Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence.   Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the way I describe above – with success.    I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0.    Best regards, Joep     DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.


  • 3.  Re: [cti-stix] RE: STIX Sightings

    Posted 10-29-2015 13:29
    Source:  RFI: Have you seen this? Recipient: No. ...Or more nuanced: Recipient: No I looked over this period of time using this method and have this level of certainty we've not had anything matching this pattern. Patrick Maroney President Integrated Networking Technologies, Inc. Desk: (856)983-0001 Cell: (609)841-5104 Email: pmaroney@specere.org On Thu, Oct 29, 2015 at 6:23 AM -0700, "Bush, Jonathan" < jbush@dtcc.com > wrote: A “negative sighting”?  Mind = Blown!   Can you talk about that some more?    From: cti-stix@lists.oasis-open.org [mailto:cti-stix@lists.oasis-open.org] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 5:39 AM To: cti-stix@lists.oasis-open.org Subject: [cti-stix] STIX Sightings   Dear list,   My view on sightings:   Threat Intelligence is in part about moving unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information, the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention).   The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if – or to what extent – they have deference, defeat or preventive measures in place.   Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings: Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication) Sightings are either produced by machines or by humans. In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting. In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports, etc. In part because you can’t ASSUME that the full context is available to be sighted. Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence.   Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the way I describe above – with success.    I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0.    Best regards, Joep     DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.


  • 4.  RE: [cti-stix] RE: STIX Sightings

    Posted 10-29-2015 13:31
    So from an implementation perspective (the part I was more eluding to conversation on), we would need a “positive/negative” indicator as a mandatory field, no?  Any other implementation implications?   From: Patrick Maroney [mailto:Pmaroney@Specere.org] Sent: Thursday, October 29, 2015 9:29 AM To: cti-stix@lists.oasis-open.org; Bush, Jonathan; 'Joep Gommers' Subject: Re: [cti-stix] RE: STIX Sightings   Source:  RFI: Have you seen this? Recipient: No. ...Or more nuanced: Recipient: No I looked over this period of time using this method and have this level of certainty we've not had anything matching this pattern. Patrick Maroney President Integrated Networking Technologies, Inc. Desk: (856)983-0001 Cell: (609)841-5104 Email: pmaroney@specere.org   On Thu, Oct 29, 2015 at 6:23 AM -0700, "Bush, Jonathan" < jbush@dtcc.com > wrote: A “negative sighting”?  Mind = Blown!   Can you talk about that some more?    From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 5:39 AM To: cti-stix@lists.oasis-open.org Subject: [cti-stix] STIX Sightings   Dear list,   My view on sightings:   Threat Intelligence is in part about moving unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information, the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention).   The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if – or to what extent – they have deference, defeat or preventive measures in place.   Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings: Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication) Sightings are either produced by machines or by humans. In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting. In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports, etc. In part because you can’t ASSUME that the full context is available to be sighted. Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence.   Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the way I describe above – with success.    I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0.    Best regards, Joep     DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email. DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.


  • 5.  Re: [cti-stix] RE: STIX Sightings

    Posted 10-29-2015 13:33
    +1 on what Patrick and Jonathan said From: "Bush, Jonathan" < jbush@dtcc.com > Date: Thursday, October 29, 2015 at 2:30 PM To: 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >, Joep Gommers < joep@eclecticiq.com > Subject: RE: [cti-stix] RE: STIX Sightings So from an implementation perspective (the part I was more eluding to conversation on), we would need a “positive/negative” indicator as a mandatory field, no?  Any other implementation implications?   From: Patrick Maroney [ mailto:Pmaroney@Specere.org ] Sent: Thursday, October 29, 2015 9:29 AM To: cti-stix@lists.oasis-open.org ; Bush, Jonathan; 'Joep Gommers' Subject: Re: [cti-stix] RE: STIX Sightings   Source:  RFI: Have you seen this? Recipient: No. ...Or more nuanced: Recipient: No I looked over this period of time using this method and have this level of certainty we've not had anything matching this pattern. Patrick Maroney President Integrated Networking Technologies, Inc. Desk: (856)983-0001 Cell: (609)841-5104 Email: pmaroney@specere.org   On Thu, Oct 29, 2015 at 6:23 AM -0700, "Bush, Jonathan" < jbush@dtcc.com > wrote: A “negative sighting”?  Mind = Blown!   Can you talk about that some more?    From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 5:39 AM To: cti-stix@lists.oasis-open.org Subject: [cti-stix] STIX Sightings   Dear list,   My view on sightings:   Threat Intelligence is in part about moving unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information, the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention).   The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if – or to what extent – they have deference, defeat or preventive measures in place.   Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings: Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication) Sightings are either produced by machines or by humans. In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting. In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports, etc. In part because you can’t ASSUME that the full context is available to be sighted. Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence.   Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the way I describe above – with success.    I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0.    Best regards, Joep     DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email. DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.


  • 6.  RE: [cti-stix] RE: STIX Sightings

    Posted 10-29-2015 14:51
    The Request/Response case and the negative sighting case seem to be slightly different to me. For the request/response case, you have a request and a specific response to that request. Some form of “empty” response in that context could be sufficient for the “negative sighting” (vs. adding a field to the data model).   In terms of a sighting that was not requested (e.g., event-based exchanges, like a sensor that sends sightings as they are seen), I don’t see how a negative sighting would be useful, since there is an infinite number of things that e.g., a sensor hasn’t seen at any given point in time.   Based on the above, I see how the ability to say “I haven’t seen that” makes sense, but I’m not sold that it needs to be accomplished with a field in the sighting object.   Thank you. -Mark   From: cti-stix@lists.oasis-open.org [mailto:cti-stix@lists.oasis-open.org] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 9:32 AM To: Bush, Jonathan <jbush@dtcc.com>; 'Patrick Maroney' <Pmaroney@Specere.org>; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] RE: STIX Sightings   +1 on what Patrick and Jonathan said   From: "Bush, Jonathan" < jbush@dtcc.com > Date: Thursday, October 29, 2015 at 2:30 PM To: 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >, Joep Gommers < joep@eclecticiq.com > Subject: RE: [cti-stix] RE: STIX Sightings   So from an implementation perspective (the part I was more eluding to conversation on), we would need a “positive/negative” indicator as a mandatory field, no?  Any other implementation implications?   From: Patrick Maroney [ mailto:Pmaroney@Specere.org ] Sent: Thursday, October 29, 2015 9:29 AM To: cti-stix@lists.oasis-open.org ; Bush, Jonathan; 'Joep Gommers' Subject: Re: [cti-stix] RE: STIX Sightings   Source:  RFI: Have you seen this? Recipient: No. ...Or more nuanced: Recipient: No I looked over this period of time using this method and have this level of certainty we've not had anything matching this pattern. Patrick Maroney President Integrated Networking Technologies, Inc. Desk: (856)983-0001 Cell: (609)841-5104 Email: pmaroney@specere.org   On Thu, Oct 29, 2015 at 6:23 AM -0700, "Bush, Jonathan" < jbush@dtcc.com > wrote: A “negative sighting”?  Mind = Blown!   Can you talk about that some more?    From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 5:39 AM To: cti-stix@lists.oasis-open.org Subject: [cti-stix] STIX Sightings   Dear list,   My view on sightings:   Threat Intelligence is in part about moving unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information, the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention).   The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if – or to what extent – they have deference, defeat or preventive measures in place.   Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings: ·          Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication) ·          Sightings are either produced by machines or by humans. ·          In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting. ·          In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports, etc. In part because you can’t ASSUME that the full context is available to be sighted. ·          Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence.   Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the way I describe above – with success.    I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0.    Best regards, Joep     DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email. DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.


  • 7.  Re: [cti-stix] STIX Sightings

    Posted 10-29-2015 15:03
    I concur with Mark for now Note: the Agree/Disagree feature discussed for the Relationship object could potentialy help (or be abstracted)  On Thursday, 29 October 2015, Davidson II, Mark S < mdavidson@mitre.org > wrote: The Request/Response case and the negative sighting case seem to be slightly different to me. For the request/response case, you have a request and a specific response to that request. Some form of “empty” response in that context could be sufficient for the “negative sighting” (vs. adding a field to the data model).   In terms of a sighting that was not requested (e.g., event-based exchanges, like a sensor that sends sightings as they are seen), I don’t see how a negative sighting would be useful, since there is an infinite number of things that e.g., a sensor hasn’t seen at any given point in time.   Based on the above, I see how the ability to say “I haven’t seen that” makes sense, but I’m not sold that it needs to be accomplished with a field in the sighting object.   Thank you. -Mark   From: cti-stix@lists.oasis-open.org [mailto: cti-stix@lists.oasis-open.org ] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 9:32 AM To: Bush, Jonathan < jbush@dtcc.com >; 'Patrick Maroney' <Pmaroney@Specere.org>; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] RE: STIX Sightings   +1 on what Patrick and Jonathan said   From: "Bush, Jonathan" < jbush@dtcc.com > Date: Thursday, October 29, 2015 at 2:30 PM To: 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >, Joep Gommers < joep@eclecticiq.com > Subject: RE: [cti-stix] RE: STIX Sightings   So from an implementation perspective (the part I was more eluding to conversation on), we would need a “positive/negative” indicator as a mandatory field, no?  Any other implementation implications?   From: Patrick Maroney [ mailto:Pmaroney@Specere.org ] Sent: Thursday, October 29, 2015 9:29 AM To: cti-stix@lists.oasis-open.org ; Bush, Jonathan; 'Joep Gommers' Subject: Re: [cti-stix] RE: STIX Sightings   Source:  RFI: Have you seen this? Recipient: No. ...Or more nuanced: Recipient: No I looked over this period of time using this method and have this level of certainty we've not had anything matching this pattern. Patrick Maroney President Integrated Networking Technologies, Inc. Desk: (856)983-0001 Cell: (609)841-5104 Email: pmaroney@specere.org   On Thu, Oct 29, 2015 at 6:23 AM -0700, "Bush, Jonathan" < jbush@dtcc.com > wrote: A “negative sighting”?  Mind = Blown!   Can you talk about that some more?    From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 5:39 AM To: cti-stix@lists.oasis-open.org Subject: [cti-stix] STIX Sightings   Dear list,   My view on sightings:   Threat Intelligence is in part about moving unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information, the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention).   The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if – or to what extent – they have deference, defeat or preventive measures in place.   Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings: ·          Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication) ·          Sightings are either produced by machines or by humans. ·          In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting. ·          In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports, etc. In part because you can’t ASSUME that the full context is available to be sighted. ·          Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence.   Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the way I describe above – with success.    I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0.    Best regards, Joep     DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email. DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.


  • 8.  Re: [cti-stix] RE: STIX Sightings

    Posted 10-29-2015 15:18




    I agree that a Sighting should just be a positive, “I saw this”. I’d love to keep the complexity down here for our initial pass. I believe that implementing a negative sighting is probably going to be orders of more magnitude than a positive sighting for
    a tool vendor. A positive Sighting can be sent as a TAXII client operation due to the limited number of them that will be generated (ie. Not infinite) and the fact that no question is being asked. However, if we have to ask someone “Have you saw this", we
    will likely require the tool vendor implement a TAXII server to send these negatives.


    TLDR
    Positive Sightings = STIX w/TAXII Client operation
    Negative Sightings = STIX w/TAXII Server 


    What if we implement RFIs using TAXII 2 query instead? We could send a TAXII query request asking if a particular observable has been seen.


    Aharon








    From: < cti-stix@lists.oasis-open.org > on behalf of "Davidson II, Mark S" < mdavidson@mitre.org >
    Date: Thursday, October 29, 2015 at 7:50 AM
    To: Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, 'Patrick Maroney' < Pmaroney@Specere.org >,
    " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Subject: RE: [cti-stix] RE: STIX Sightings








    The Request/Response case and the negative sighting case seem to be slightly different to me. For the request/response case, you have a request and a specific
    response to that request. Some form of “empty” response in that context could be sufficient for the “negative sighting” (vs. adding a field to the data model).
     
    In terms of a sighting that was not requested (e.g., event-based exchanges, like a sensor that sends sightings as they are seen), I don’t see how a negative sighting
    would be useful, since there is an infinite number of things that e.g., a sensor hasn’t seen at any given point in time.
     
    Based on the above, I see how the ability to say “I haven’t seen that” makes sense, but I’m not sold that it needs to be accomplished with a field in the sighting
    object.
     
    Thank you.
    -Mark
     


    From:
    cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ]
    On Behalf Of Joep Gommers
    Sent: Thursday, October 29, 2015 9:32 AM
    To: Bush, Jonathan < jbush@dtcc.com >; 'Patrick Maroney' < Pmaroney@Specere.org >;
    cti-stix@lists.oasis-open.org
    Subject: Re: [cti-stix] RE: STIX Sightings


     

    +1 on what Patrick and Jonathan said


     


    From:
    "Bush, Jonathan" < jbush@dtcc.com >
    Date: Thursday, October 29, 2015 at 2:30 PM
    To: 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org "
    < cti-stix@lists.oasis-open.org >, Joep Gommers < joep@eclecticiq.com >
    Subject: RE: [cti-stix] RE: STIX Sightings


     



    So from an implementation perspective (the part I was more eluding to conversation on), we would need a “positive/negative” indicator as
    a mandatory field, no?  Any other implementation implications?
     


    From: Patrick Maroney [ mailto:Pmaroney@Specere.org ]

    Sent: Thursday, October 29, 2015 9:29 AM
    To: cti-stix@lists.oasis-open.org ; Bush, Jonathan;
    'Joep Gommers'
    Subject: Re: [cti-stix] RE: STIX Sightings


     

    Source:  RFI: Have you seen this?


    Recipient: No.


    ...Or more nuanced:



    Recipient: No I looked over this period of time using this method and have this level of certainty we've not had anything matching this pattern.

    Patrick Maroney
    President
    Integrated Networking Technologies, Inc.
    Desk: (856)983-0001
    Cell: (609)841-5104
    Email: pmaroney@specere.org

     








    On Thu, Oct 29, 2015 at 6:23 AM -0700, "Bush, Jonathan" < jbush@dtcc.com > wrote:



    A “negative sighting”?  Mind = Blown!
     
    Can you talk about that some more? 

     


    From: cti-stix@lists.oasis-open.org
    [ mailto:cti-stix@lists.oasis-open.org ]
    On Behalf Of Joep Gommers
    Sent: Thursday, October 29, 2015 5:39 AM
    To: cti-stix@lists.oasis-open.org
    Subject: [cti-stix] STIX Sightings


     

    Dear list,


     


    My view on sightings:


     


    Threat Intelligence is in part about moving
    unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these
    known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information,
    the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention).


     


    The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around Threat
    Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if – or to what
    extent – they have deference, defeat or preventive measures in place.


     


    Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position
    – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings:


    ·         
    Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication)

    ·         
    Sightings are either produced by machines or by humans.

    ·         
    In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A specific
    observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis is described
    in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting.

    ·         
    In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports,
    etc. In part because you can’t ASSUME that the full context is available to be sighted.

    ·         
    Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of STIX.
    Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence.

     


    Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the way
    I describe above – with success. 


     


    I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0. 


     


    Best regards,


    Joep


     


     



    DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email
    and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.



    DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email
    and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.












  • 9.  Re: [cti-stix] RE: STIX Sightings

    Posted 10-29-2015 15:22




    Propose that (1) the CTI Standard should include support for and RFI (Request For Information) mechanism and (2) this could just a form/requirement of  a STIX Query Language.


    .
    Patrick Maroney









    From: "Chernin, Aharon" < achernin@soltra.com >
    Date: Thursday, October 29, 2015 at 11:17 AM
    To: Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >,
    Patrick Maroney < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Subject: Re: [cti-stix] RE: STIX Sightings






    I agree that a Sighting should just be a positive, “I saw this”. I’d love to keep the complexity down here for our initial pass. I believe that implementing a negative sighting is probably going to be orders of more magnitude than a positive sighting for
    a tool vendor. A positive Sighting can be sent as a TAXII client operation due to the limited number of them that will be generated (ie. Not infinite) and the fact that no question is being asked. However, if we have to ask someone “Have you saw this", we
    will likely require the tool vendor implement a TAXII server to send these negatives.


    TLDR
    Positive Sightings = STIX w/TAXII Client operation
    Negative Sightings = STIX w/TAXII Server 


    What if we implement RFIs using TAXII 2 query instead? We could send a TAXII query request asking if a particular observable has been seen.


    Aharon








    From: < cti-stix@lists.oasis-open.org > on behalf of "Davidson II, Mark S" < mdavidson@mitre.org >
    Date: Thursday, October 29, 2015 at 7:50 AM
    To: Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, 'Patrick Maroney' < Pmaroney@Specere.org >,
    " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Subject: RE: [cti-stix] RE: STIX Sightings








    The Request/Response case and the negative sighting case seem to be slightly different to me. For the request/response case, you have a request and
    a specific response to that request. Some form of “empty” response in that context could be sufficient for the “negative sighting” (vs. adding a field to the data model).
     
    In terms of a sighting that was not requested (e.g., event-based exchanges, like a sensor that sends sightings as they are seen), I don’t see how
    a negative sighting would be useful, since there is an infinite number of things that e.g., a sensor hasn’t seen at any given point in time.
     
    Based on the above, I see how the ability to say “I haven’t seen that” makes sense, but I’m not sold that it needs to be accomplished with a field
    in the sighting object.
     
    Thank you.
    -Mark
     


    From: cti-stix@lists.oasis-open.org
    [ mailto:cti-stix@lists.oasis-open.org ]
    On Behalf Of Joep Gommers
    Sent: Thursday, October 29, 2015 9:32 AM
    To: Bush, Jonathan < jbush@dtcc.com >; 'Patrick Maroney' < Pmaroney@Specere.org >;
    cti-stix@lists.oasis-open.org
    Subject: Re: [cti-stix] RE: STIX Sightings


     

    +1 on what Patrick and Jonathan said


     


    From:
    "Bush, Jonathan" < jbush@dtcc.com >
    Date: Thursday, October 29, 2015 at 2:30 PM
    To: 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org "
    < cti-stix@lists.oasis-open.org >, Joep Gommers < joep@eclecticiq.com >
    Subject: RE: [cti-stix] RE: STIX Sightings


     



    So from an implementation perspective (the part I was more eluding to conversation on), we would need a “positive/negative” indicator
    as a mandatory field, no?  Any other implementation implications?
     


    From: Patrick Maroney [ mailto:Pmaroney@Specere.org ]

    Sent: Thursday, October 29, 2015 9:29 AM
    To: cti-stix@lists.oasis-open.org ; Bush, Jonathan;
    'Joep Gommers'
    Subject: Re: [cti-stix] RE: STIX Sightings


     

    Source:  RFI: Have you seen this?


    Recipient: No.


    ...Or more nuanced:



    Recipient: No I looked over this period of time using this method and have this level of certainty we've not had anything matching this pattern.

    Patrick Maroney
    President
    Integrated Networking Technologies, Inc.
    Desk: (856)983-0001
    Cell: (609)841-5104
    Email: pmaroney@specere.org

     








    On Thu, Oct 29, 2015 at 6:23 AM -0700, "Bush, Jonathan" < jbush@dtcc.com > wrote:



    A “negative sighting”?  Mind = Blown!
     
    Can you talk about that some more? 

     


    From: cti-stix@lists.oasis-open.org
    [ mailto:cti-stix@lists.oasis-open.org ]
    On Behalf Of Joep Gommers
    Sent: Thursday, October 29, 2015 5:39 AM
    To: cti-stix@lists.oasis-open.org
    Subject: [cti-stix] STIX Sightings


     

    Dear list,


     


    My view on sightings:


     


    Threat Intelligence is in part about moving
    unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these
    known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information,
    the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention).


     


    The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around
    Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if –
    or to what extent – they have deference, defeat or preventive measures in place.


     


    Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position
    – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings:


    ·         
    Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication)

    ·         
    Sightings are either produced by machines or by humans.

    ·         
    In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A
    specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis
    is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting.

    ·         
    In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports,
    etc. In part because you can’t ASSUME that the full context is available to be sighted.

    ·         
    Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of
    STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence.

     


    Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the
    way I describe above – with success. 


     


    I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0. 


     


    Best regards,


    Joep


     


     



    DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email
    and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.



    DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email
    and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.














  • 10.  Re: [cti-stix] RE: STIX Sightings

    Posted 10-29-2015 15:26





    I agree that RFIs (or really Request/Response scenarios in general) should be supported in the CTI ecosystem but think they are best addressed at the TAXII level and not within STIX and/or CybOX.
    Let’s let STIX and CybOX focus on the information going back and forth and not on the specifics of the process of how it goes back and forth.


    sean









    From: " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > on behalf of Patrick Maroney < Pmaroney@Specere.org >
    Date: Thursday, October 29, 2015 at 11:22 AM
    To: Aharon Chernin < achernin@soltra.com >, Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >,
    "Jonathan Bush (DTCC)" < jbush@dtcc.com >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Subject: Re: [cti-stix] RE: STIX Sightings






    Propose that (1) the CTI Standard should include support for and RFI (Request For Information) mechanism and (2) this could just a form/requirement of  a STIX Query Language.


    .
    Patrick Maroney









    From: "Chernin, Aharon" < achernin@soltra.com >
    Date: Thursday, October 29, 2015 at 11:17 AM
    To: Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >,
    Patrick Maroney < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Subject: Re: [cti-stix] RE: STIX Sightings






    I agree that a Sighting should just be a positive, “I saw this”. I’d love to keep the complexity down here for our initial pass. I believe that implementing a negative sighting is probably going to be orders of more magnitude than a positive sighting for
    a tool vendor. A positive Sighting can be sent as a TAXII client operation due to the limited number of them that will be generated (ie. Not infinite) and the fact that no question is being asked. However, if we have to ask someone “Have you saw this", we
    will likely require the tool vendor implement a TAXII server to send these negatives.


    TLDR
    Positive Sightings = STIX w/TAXII Client operation
    Negative Sightings = STIX w/TAXII Server 


    What if we implement RFIs using TAXII 2 query instead? We could send a TAXII query request asking if a particular observable has been seen.


    Aharon








    From: < cti-stix@lists.oasis-open.org > on behalf of "Davidson II, Mark S" < mdavidson@mitre.org >
    Date: Thursday, October 29, 2015 at 7:50 AM
    To: Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, 'Patrick Maroney' < Pmaroney@Specere.org >,
    " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Subject: RE: [cti-stix] RE: STIX Sightings








    The Request/Response case and the negative sighting case seem to be slightly different to me. For the request/response case, you have a request and
    a specific response to that request. Some form of “empty” response in that context could be sufficient for the “negative sighting” (vs. adding a field to the data model).
     
    In terms of a sighting that was not requested (e.g., event-based exchanges, like a sensor that sends sightings as they are seen), I don’t see how
    a negative sighting would be useful, since there is an infinite number of things that e.g., a sensor hasn’t seen at any given point in time.
     
    Based on the above, I see how the ability to say “I haven’t seen that” makes sense, but I’m not sold that it needs to be accomplished with a field
    in the sighting object.
     
    Thank you.
    -Mark
     


    From: cti-stix@lists.oasis-open.org
    [ mailto:cti-stix@lists.oasis-open.org ]
    On Behalf Of Joep Gommers
    Sent: Thursday, October 29, 2015 9:32 AM
    To: Bush, Jonathan < jbush@dtcc.com >; 'Patrick Maroney' < Pmaroney@Specere.org >;
    cti-stix@lists.oasis-open.org
    Subject: Re: [cti-stix] RE: STIX Sightings


     

    +1 on what Patrick and Jonathan said


     


    From:
    "Bush, Jonathan" < jbush@dtcc.com >
    Date: Thursday, October 29, 2015 at 2:30 PM
    To: 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org "
    < cti-stix@lists.oasis-open.org >, Joep Gommers < joep@eclecticiq.com >
    Subject: RE: [cti-stix] RE: STIX Sightings


     



    So from an implementation perspective (the part I was more eluding to conversation on), we would need a “positive/negative” indicator
    as a mandatory field, no?  Any other implementation implications?
     


    From: Patrick Maroney [ mailto:Pmaroney@Specere.org ]

    Sent: Thursday, October 29, 2015 9:29 AM
    To: cti-stix@lists.oasis-open.org ; Bush, Jonathan;
    'Joep Gommers'
    Subject: Re: [cti-stix] RE: STIX Sightings


     

    Source:  RFI: Have you seen this?


    Recipient: No.


    ...Or more nuanced:



    Recipient: No I looked over this period of time using this method and have this level of certainty we've not had anything matching this pattern.

    Patrick Maroney
    President
    Integrated Networking Technologies, Inc.
    Desk: (856)983-0001
    Cell: (609)841-5104
    Email: pmaroney@specere.org

     








    On Thu, Oct 29, 2015 at 6:23 AM -0700, "Bush, Jonathan" < jbush@dtcc.com > wrote:



    A “negative sighting”?  Mind = Blown!
     
    Can you talk about that some more? 

     


    From: cti-stix@lists.oasis-open.org
    [ mailto:cti-stix@lists.oasis-open.org ]
    On Behalf Of Joep Gommers
    Sent: Thursday, October 29, 2015 5:39 AM
    To: cti-stix@lists.oasis-open.org
    Subject: [cti-stix] STIX Sightings


     

    Dear list,


     


    My view on sightings:


     


    Threat Intelligence is in part about moving
    unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these
    known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information,
    the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention).


     


    The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around
    Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if –
    or to what extent – they have deference, defeat or preventive measures in place.


     


    Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position
    – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings:


    ·         
    Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication)

    ·         
    Sightings are either produced by machines or by humans.

    ·         
    In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A
    specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis
    is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting.

    ·         
    In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports,
    etc. In part because you can’t ASSUME that the full context is available to be sighted.

    ·         
    Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of
    STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence.

     


    Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the
    way I describe above – with success. 


     


    I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0. 


     


    Best regards,


    Joep


     


     



    DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email
    and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.



    DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email
    and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.
















  • 11.  Re: [cti-stix] STIX Sightings

    Posted 10-29-2015 15:42
    They are working on it with REST or similar (I concur that we should not redefine SQL :p) On Thursday, 29 October 2015, Barnum, Sean D. < sbarnum@mitre.org > wrote: I agree that RFIs (or really Request/Response scenarios in general) should be supported in the CTI ecosystem but think they are best addressed at the TAXII level and not within STIX and/or CybOX. Let’s let STIX and CybOX focus on the information going back and forth and not on the specifics of the process of how it goes back and forth. sean From: " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > on behalf of Patrick Maroney < Pmaroney@Specere.org > Date: Thursday, October 29, 2015 at 11:22 AM To: Aharon Chernin < achernin@soltra.com >, Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Subject: Re: [cti-stix] RE: STIX Sightings Propose that (1) the CTI Standard should include support for and RFI (Request For Information) mechanism and (2) this could just a form/requirement of  a STIX Query Language. . Patrick Maroney From: "Chernin, Aharon" < achernin@soltra.com > Date: Thursday, October 29, 2015 at 11:17 AM To: Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, Patrick Maroney < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Subject: Re: [cti-stix] RE: STIX Sightings I agree that a Sighting should just be a positive, “I saw this”. I’d love to keep the complexity down here for our initial pass. I believe that implementing a negative sighting is probably going to be orders of more magnitude than a positive sighting for a tool vendor. A positive Sighting can be sent as a TAXII client operation due to the limited number of them that will be generated (ie. Not infinite) and the fact that no question is being asked. However, if we have to ask someone “Have you saw this", we will likely require the tool vendor implement a TAXII server to send these negatives. TLDR Positive Sightings = STIX w/TAXII Client operation Negative Sightings = STIX w/TAXII Server  What if we implement RFIs using TAXII 2 query instead? We could send a TAXII query request asking if a particular observable has been seen. Aharon From: < cti-stix@lists.oasis-open.org > on behalf of "Davidson II, Mark S" < mdavidson@mitre.org > Date: Thursday, October 29, 2015 at 7:50 AM To: Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Subject: RE: [cti-stix] RE: STIX Sightings The Request/Response case and the negative sighting case seem to be slightly different to me. For the request/response case, you have a request and a specific response to that request. Some form of “empty” response in that context could be sufficient for the “negative sighting” (vs. adding a field to the data model).   In terms of a sighting that was not requested (e.g., event-based exchanges, like a sensor that sends sightings as they are seen), I don’t see how a negative sighting would be useful, since there is an infinite number of things that e.g., a sensor hasn’t seen at any given point in time.   Based on the above, I see how the ability to say “I haven’t seen that” makes sense, but I’m not sold that it needs to be accomplished with a field in the sighting object.   Thank you. -Mark   From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 9:32 AM To: Bush, Jonathan < jbush@dtcc.com >; 'Patrick Maroney' < Pmaroney@Specere.org >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] RE: STIX Sightings   +1 on what Patrick and Jonathan said   From: "Bush, Jonathan" < jbush@dtcc.com > Date: Thursday, October 29, 2015 at 2:30 PM To: 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >, Joep Gommers < joep@eclecticiq.com > Subject: RE: [cti-stix] RE: STIX Sightings   So from an implementation perspective (the part I was more eluding to conversation on), we would need a “positive/negative” indicator as a mandatory field, no?  Any other implementation implications?   From: Patrick Maroney [ mailto:Pmaroney@Specere.org ] Sent: Thursday, October 29, 2015 9:29 AM To: cti-stix@lists.oasis-open.org ; Bush, Jonathan; 'Joep Gommers' Subject: Re: [cti-stix] RE: STIX Sightings   Source:  RFI: Have you seen this? Recipient: No. ...Or more nuanced: Recipient: No I looked over this period of time using this method and have this level of certainty we've not had anything matching this pattern. Patrick Maroney President Integrated Networking Technologies, Inc. Desk: (856)983-0001 Cell: (609)841-5104 Email: pmaroney@specere.org   On Thu, Oct 29, 2015 at 6:23 AM -0700, "Bush, Jonathan" < jbush@dtcc.com > wrote: A “negative sighting”?  Mind = Blown!   Can you talk about that some more?    From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 5:39 AM To: cti-stix@lists.oasis-open.org Subject: [cti-stix] STIX Sightings   Dear list,   My view on sightings:   Threat Intelligence is in part about moving unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information, the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention).   The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if – or to what extent – they have deference, defeat or preventive measures in place.   Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings: ·          Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication) ·          Sightings are either produced by machines or by humans. ·          In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting. ·          In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports, etc. In part because you can’t ASSUME that the full context is available to be sighted. ·          Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence.   Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the way I describe above – with success.    I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0.    Best regards, Joep     DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email. DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.


  • 12.  RE: [cti-stix] RE: STIX Sightings

    Posted 10-29-2015 21:46




    I disagree here. I think it’s a STIX problem to solve, and here’s why…. (apologies for the length of the email!)
     
    PROBLEM:
     
    There is no real mechanism within STIX for a consumer of STIX data to ask a question from the rest of the threat sharing community
    that they are part of. This functionality is required if we are going to get good multi-directional threat intelligence sharing happening.

     
    - A threat sharing community member has detected an IP address while doing some local network hunting that seems to be malicious, but
    they are unsure if it actually is. STIX needs to be able to allow the community member to send out a 'does anyone have information they can share about this' STIX request out to the entire community, and allow any other community member to reply to the community
    member. The replies may be shared with the entire community, or may be sent directly to the requester.
     
    This is different from the normal 'broadcast' style STIX message, where the message is just sent to all parties and no replies are
    expected. With STIX request/response there is a direct question/answer relationship required.

     
    Please note this request/response is also different to TAXII Query, as the question is being asked to all members of the channel, rather
    than just the single TAXII server you are locally connecting to (which is IMHO more where TAXII Query fits in).
     
    POTENTIAL ANSWER:
     
    Creating a STIX Request Package and a STIX Response Package seems to be a good answer to this problem.

     
    As I see it, a sender would have two types of questions they would want answered:
    - I have a 'thing' (e.g. IP address), and I to find more objects that are related to this thing so I understand it better (crowdsourced
    responses)
    - I have a particular STIX object and I would like to get the latest version of that object from the producer (particular object responses)
     
    For the crowdsourced responses option, the STIX Request Package would contain a list of related STIX objects that the sender would
    like more information about. The STIX Request Package could contain something as small as a single IP address, or could contain a large slice of related data e.g. a list of 5200 Observables, Indicators, TTPs, Campaigns and Threat Actors. The STIX Request package
    would be sent to all recipients in the Threat Sharing Group, and any/all of the Threat Sharing Group members would be able to respond via a STIX Response package. STIX Responses from Threat Sharing Group members would be able to be sent to all Threat Sharing
    Group members (group reply) or sent directly back to the original STIX Request package author as a direct response (private reply). The STI Responses need to be able to say 'Yes, we've seen it, and we've included some objects that are related to it', or 'No,
    we've not seen it'.
     
    For the particular object responses option, the STIX Request Package would contain a list of STIX identifiers that the sender would
    like more information about. The STIX Request Package would be sent directly to the producer of the object being queried. ** This relies on the fact  that STIX IDs include the producers namespace, that the namespace includes the domain name of the Producer,
    and that the producer has the relevant TAXII auto-discovery functionality enabled in their setup **. The producer would then look at the STIX Request Package author to determine if the proiducer wishes that information to be shared, and also check if the STIX
    Request Package author has the correct permissions to have access to that data. If they do then the data (or subset of the data) should be returned. This sort of STIX Request Package would always be sent back original STIX Request package author as a direct
    response (private reply).
     
    Having both these features would enable more question and answers to be asked across threat sharing groups, meaning that Threat Analysts
    and Incident Responders would have the ability to find out more about their own particular use cases - hopefully improving the speed and effectiveness of Incident Response.
     
    Cheers
     

    Terry MacDonald
    Senior STIX Subject Matter Expert
    SOLTRA   An FS-ISAC and DTCC Company
    +61 (407) 203 206
    terry@soltra.com
     

     


    From: cti-stix@lists.oasis-open.org [mailto:cti-stix@lists.oasis-open.org]
    On Behalf Of Barnum, Sean D.
    Sent: Friday, 30 October 2015 2:26 AM
    To: Patrick Maroney <Pmaroney@Specere.org>; Aharon Chernin <achernin@soltra.com>; Davidson II, Mark S <mdavidson@mitre.org>; Joep Gommers <joep@eclecticiq.com>; Jonathan Bush (DTCC) <jbush@dtcc.com>; cti-stix@lists.oasis-open.org
    Subject: Re: [cti-stix] RE: STIX Sightings


     



    I agree that RFIs (or really Request/Response scenarios in general) should be supported in the CTI ecosystem but think they are best addressed at the TAXII level
    and not within STIX and/or CybOX.


    Let’s let STIX and CybOX focus on the information going back and forth and not on the specifics of the process of how it goes back and forth.


     


    sean




     


    From:
    " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > on behalf of Patrick
    Maroney < Pmaroney@Specere.org >
    Date: Thursday, October 29, 2015 at 11:22 AM
    To: Aharon Chernin < achernin@soltra.com >, Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush
    (DTCC)" < jbush@dtcc.com >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Subject: Re: [cti-stix] RE: STIX Sightings


     





    Propose that (1) the CTI Standard should include support for and RFI (Request For Information) mechanism and (2) this could just a form/requirement of  a STIX Query
    Language.




    .


    Patrick Maroney


     





     


    From:
    "Chernin, Aharon" < achernin@soltra.com >
    Date: Thursday, October 29, 2015 at 11:17 AM
    To: Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, Patrick Maroney
    < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Subject: Re: [cti-stix] RE: STIX Sightings


     





    I agree that a Sighting should just be a positive, “I saw this”. I’d love to keep the complexity down here for our initial pass. I believe that implementing a negative
    sighting is probably going to be orders of more magnitude than a positive sighting for a tool vendor. A positive Sighting can be sent as a TAXII client operation due to the limited number of them that will be generated (ie. Not infinite) and the fact that
    no question is being asked. However, if we have to ask someone “Have you saw this", we will likely require the tool vendor implement a TAXII server to send these negatives.


     


    TLDR


    Positive Sightings = STIX w/TAXII Client operation


    Negative Sightings = STIX w/TAXII Server 


     


    What if we implement RFIs using TAXII 2 query instead? We could send a TAXII query request asking if a particular observable has been seen.


     


    Aharon



     


    From:
    < cti-stix@lists.oasis-open.org > on behalf of "Davidson II, Mark S" < mdavidson@mitre.org >
    Date: Thursday, October 29, 2015 at 7:50 AM
    To: Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org "
    < cti-stix@lists.oasis-open.org >
    Subject: RE: [cti-stix] RE: STIX Sightings


     



    The Request/Response case and the negative sighting case seem to be slightly different to me. For the request/response case, you have a request and
    a specific response to that request. Some form of “empty” response in that context could be sufficient for the “negative sighting” (vs. adding a field to the data model).
     
    In terms of a sighting that was not requested (e.g., event-based exchanges, like a sensor that sends sightings as they are seen), I don’t see how
    a negative sighting would be useful, since there is an infinite number of things that e.g., a sensor hasn’t seen at any given point in time.
     
    Based on the above, I see how the ability to say “I haven’t seen that” makes sense, but I’m not sold that it needs to be accomplished with a field
    in the sighting object.
     
    Thank you.
    -Mark
     


    From: cti-stix@lists.oasis-open.org
    [ mailto:cti-stix@lists.oasis-open.org ]
    On Behalf Of Joep Gommers
    Sent: Thursday, October 29, 2015 9:32 AM
    To: Bush, Jonathan < jbush@dtcc.com >; 'Patrick Maroney' < Pmaroney@Specere.org >;
    cti-stix@lists.oasis-open.org
    Subject: Re: [cti-stix] RE: STIX Sightings


     

    +1 on what Patrick and Jonathan said


     


    From:
    "Bush, Jonathan" < jbush@dtcc.com >
    Date: Thursday, October 29, 2015 at 2:30 PM
    To: 'Patrick Maroney' < Pmaroney@Specere.org >,
    " cti-stix@lists.oasis-open.org "
    < cti-stix@lists.oasis-open.org >,
    Joep Gommers < joep@eclecticiq.com >
    Subject: RE: [cti-stix] RE: STIX Sightings


     



    So from an implementation perspective (the part I was more eluding to conversation on), we would need a “positive/negative”
    indicator as a mandatory field, no?  Any other implementation implications?
     


    From: Patrick Maroney
    [ mailto:Pmaroney@Specere.org ]

    Sent: Thursday, October 29, 2015 9:29 AM
    To: cti-stix@lists.oasis-open.org ;
    Bush, Jonathan; 'Joep Gommers'
    Subject: Re: [cti-stix] RE: STIX Sightings


     

    Source:  RFI: Have you seen this?


    Recipient: No.


    ...Or more nuanced:



    Recipient: No I looked over this period of time using this method and have this level of certainty we've not had anything matching this pattern.

    Patrick Maroney
    President
    Integrated Networking Technologies, Inc.
    Desk: (856)983-0001
    Cell: (609)841-5104
    Email: pmaroney@specere.org

     









    On Thu, Oct 29, 2015 at 6:23 AM -0700, "Bush, Jonathan" < jbush@dtcc.com > wrote:



    A “negative sighting”?  Mind = Blown!
     
    Can you talk about that some more? 

     


    From: cti-stix@lists.oasis-open.org
    [ mailto:cti-stix@lists.oasis-open.org ]
    On Behalf Of Joep Gommers
    Sent: Thursday, October 29, 2015 5:39 AM
    To: cti-stix@lists.oasis-open.org
    Subject: [cti-stix] STIX Sightings


     

    Dear list,


     


    My view on sightings:


     


    Threat Intelligence is in part about moving
    unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these
    known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information,
    the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention).


     


    The emerging threat intelligence or threat management function in the large enterprise and government institution revolves
    around Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and
    if – or to what extent – they have deference, defeat or preventive measures in place.


     


    Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information
    position – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for
    STIX Sightings:


    ·         
    Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication)

    ·         
    Sightings are either produced by machines or by humans.

    ·         
    In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g.
    A specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis
    is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting.

    ·         
    In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents,
    Reports, etc. In part because you can’t ASSUME that the full context is available to be sighted.

    ·         
    Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future
    of STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence.

     


    Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in
    much of the way I describe above – with success. 


     


    I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0. 


     


    Best regards,


    Joep


     


     



    DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email
    and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.



    DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email
    and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.















  • 13.  Re: [cti-stix] STIX Sightings

    Posted 10-30-2015 04:12
    I do understand the use cases  (Of course when i find a suspicious file, i will check its hash on virustotal before starting analyzing it) Now i would more imagine to send RFIs via TAXII. Where we could imagine an à la DNS architecture of TAXII servers. For that i would imagine an API for TAXII. And yes of course this API mechanism can only exists if it supports (understands) STIX/CybOX/MAEC...  On Friday, 30 October 2015, Terry MacDonald < terry@soltra.com > wrote: I disagree here. I think it’s a STIX problem to solve, and here’s why…. (apologies for the length of the email!)   PROBLEM:   There is no real mechanism within STIX for a consumer of STIX data to ask a question from the rest of the threat sharing community that they are part of. This functionality is required if we are going to get good multi-directional threat intelligence sharing happening.   - A threat sharing community member has detected an IP address while doing some local network hunting that seems to be malicious, but they are unsure if it actually is. STIX needs to be able to allow the community member to send out a 'does anyone have information they can share about this' STIX request out to the entire community, and allow any other community member to reply to the community member. The replies may be shared with the entire community, or may be sent directly to the requester.   This is different from the normal 'broadcast' style STIX message, where the message is just sent to all parties and no replies are expected. With STIX request/response there is a direct question/answer relationship required.   Please note this request/response is also different to TAXII Query, as the question is being asked to all members of the channel, rather than just the single TAXII server you are locally connecting to (which is IMHO more where TAXII Query fits in).   POTENTIAL ANSWER:   Creating a STIX Request Package and a STIX Response Package seems to be a good answer to this problem.   As I see it, a sender would have two types of questions they would want answered: - I have a 'thing' (e.g. IP address), and I to find more objects that are related to this thing so I understand it better (crowdsourced responses) - I have a particular STIX object and I would like to get the latest version of that object from the producer (particular object responses)   For the crowdsourced responses option, the STIX Request Package would contain a list of related STIX objects that the sender would like more information about. The STIX Request Package could contain something as small as a single IP address, or could contain a large slice of related data e.g. a list of 5200 Observables, Indicators, TTPs, Campaigns and Threat Actors. The STIX Request package would be sent to all recipients in the Threat Sharing Group, and any/all of the Threat Sharing Group members would be able to respond via a STIX Response package. STIX Responses from Threat Sharing Group members would be able to be sent to all Threat Sharing Group members (group reply) or sent directly back to the original STIX Request package author as a direct response (private reply). The STI Responses need to be able to say 'Yes, we've seen it, and we've included some objects that are related to it', or 'No, we've not seen it'.   For the particular object responses option, the STIX Request Package would contain a list of STIX identifiers that the sender would like more information about. The STIX Request Package would be sent directly to the producer of the object being queried. ** This relies on the fact  that STIX IDs include the producers namespace, that the namespace includes the domain name of the Producer, and that the producer has the relevant TAXII auto-discovery functionality enabled in their setup **. The producer would then look at the STIX Request Package author to determine if the proiducer wishes that information to be shared, and also check if the STIX Request Package author has the correct permissions to have access to that data. If they do then the data (or subset of the data) should be returned. This sort of STIX Request Package would always be sent back original STIX Request package author as a direct response (private reply).   Having both these features would enable more question and answers to be asked across threat sharing groups, meaning that Threat Analysts and Incident Responders would have the ability to find out more about their own particular use cases - hopefully improving the speed and effectiveness of Incident Response.   Cheers   Terry MacDonald Senior STIX Subject Matter Expert SOLTRA   An FS-ISAC and DTCC Company +61 (407) 203 206 terry@soltra.com     From: cti-stix@lists.oasis-open.org [mailto: cti-stix@lists.oasis-open.org ] On Behalf Of Barnum, Sean D. Sent: Friday, 30 October 2015 2:26 AM To: Patrick Maroney <Pmaroney@Specere.org>; Aharon Chernin < achernin@soltra.com >; Davidson II, Mark S < mdavidson@mitre.org >; Joep Gommers < joep@eclecticiq.com >; Jonathan Bush (DTCC) < jbush@dtcc.com >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] RE: STIX Sightings   I agree that RFIs (or really Request/Response scenarios in general) should be supported in the CTI ecosystem but think they are best addressed at the TAXII level and not within STIX and/or CybOX. Let’s let STIX and CybOX focus on the information going back and forth and not on the specifics of the process of how it goes back and forth.   sean   From: " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > on behalf of Patrick Maroney < Pmaroney@Specere.org > Date: Thursday, October 29, 2015 at 11:22 AM To: Aharon Chernin < achernin@soltra.com >, Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Subject: Re: [cti-stix] RE: STIX Sightings   Propose that (1) the CTI Standard should include support for and RFI (Request For Information) mechanism and (2) this could just a form/requirement of  a STIX Query Language. . Patrick Maroney     From: "Chernin, Aharon" < achernin@soltra.com > Date: Thursday, October 29, 2015 at 11:17 AM To: Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, Patrick Maroney < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Subject: Re: [cti-stix] RE: STIX Sightings   I agree that a Sighting should just be a positive, “I saw this”. I’d love to keep the complexity down here for our initial pass. I believe that implementing a negative sighting is probably going to be orders of more magnitude than a positive sighting for a tool vendor. A positive Sighting can be sent as a TAXII client operation due to the limited number of them that will be generated (ie. Not infinite) and the fact that no question is being asked. However, if we have to ask someone “Have you saw this", we will likely require the tool vendor implement a TAXII server to send these negatives.   TLDR Positive Sightings = STIX w/TAXII Client operation Negative Sightings = STIX w/TAXII Server    What if we implement RFIs using TAXII 2 query instead? We could send a TAXII query request asking if a particular observable has been seen.   Aharon   From: < cti-stix@lists.oasis-open.org > on behalf of "Davidson II, Mark S" < mdavidson@mitre.org > Date: Thursday, October 29, 2015 at 7:50 AM To: Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Subject: RE: [cti-stix] RE: STIX Sightings   The Request/Response case and the negative sighting case seem to be slightly different to me. For the request/response case, you have a request and a specific response to that request. Some form of “empty” response in that context could be sufficient for the “negative sighting” (vs. adding a field to the data model).   In terms of a sighting that was not requested (e.g., event-based exchanges, like a sensor that sends sightings as they are seen), I don’t see how a negative sighting would be useful, since there is an infinite number of things that e.g., a sensor hasn’t seen at any given point in time.   Based on the above, I see how the ability to say “I haven’t seen that” makes sense, but I’m not sold that it needs to be accomplished with a field in the sighting object.   Thank you. -Mark   From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 9:32 AM To: Bush, Jonathan < jbush@dtcc.com >; 'Patrick Maroney' < Pmaroney@Specere.org >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] RE: STIX Sightings   +1 on what Patrick and Jonathan said   From: "Bush, Jonathan" < jbush@dtcc.com > Date: Thursday, October 29, 2015 at 2:30 PM To: 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >, Joep Gommers < joep@eclecticiq.com > Subject: RE: [cti-stix] RE: STIX Sightings   So from an implementation perspective (the part I was more eluding to conversation on), we would need a “positive/negative” indicator as a mandatory field, no?  Any other implementation implications?   From: Patrick Maroney [ mailto:Pmaroney@Specere.org ] Sent: Thursday, October 29, 2015 9:29 AM To: cti-stix@lists.oasis-open.org ; Bush, Jonathan; 'Joep Gommers' Subject: Re: [cti-stix] RE: STIX Sightings   Source:  RFI: Have you seen this? Recipient: No. ...Or more nuanced: Recipient: No I looked over this period of time using this method and have this level of certainty we've not had anything matching this pattern. Patrick Maroney President Integrated Networking Technologies, Inc. Desk: (856)983-0001 Cell: (609)841-5104 Email: pmaroney@specere.org   On Thu, Oct 29, 2015 at 6:23 AM -0700, "Bush, Jonathan" < jbush@dtcc.com > wrote: A “negative sighting”?  Mind = Blown!   Can you talk about that some more?    From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 5:39 AM To: cti-stix@lists.oasis-open.org Subject: [cti-stix] STIX Sightings   Dear list,   My view on sightings:   Threat Intelligence is in part about moving unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information, the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention).   The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if – or to what extent – they have deference, defeat or preventive measures in place.   Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings: ·          Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication) ·          Sightings are either produced by machines or by humans. ·          In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting. ·          In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports, etc. In part because you can’t ASSUME that the full context is available to be sighted. ·          Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence.   Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the way I describe above – with success.    I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0.    Best regards, Joep     DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email. DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.


  • 14.  Re: [cti-stix] STIX Sightings

    Posted 10-30-2015 04:54
    Yes, I see this request / response going over the TAXII 2.0 channel structure.  Our design could handle this use case / work flow very easily.  As it is really one of my core use cases I brought up in TAXII land long ago.  That is two network devices talking back and forth.  I just called dynamic data enrichment.  But it is effectively the same thing. Bret  Sent from my Commodore 64 On Oct 29, 2015, at 10:12 PM, Jerome Athias < athiasjerome@gmail.com > wrote: I do understand the use cases  (Of course when i find a suspicious file, i will check its hash on virustotal before starting analyzing it) Now i would more imagine to send RFIs via TAXII. Where we could imagine an à la DNS architecture of TAXII servers. For that i would imagine an API for TAXII. And yes of course this API mechanism can only exists if it supports (understands) STIX/CybOX/MAEC...  On Friday, 30 October 2015, Terry MacDonald < terry@soltra.com > wrote: I disagree here. I think it’s a STIX problem to solve, and here’s why…. (apologies for the length of the email!)   PROBLEM:   There is no real mechanism within STIX for a consumer of STIX data to ask a question from the rest of the threat sharing community that they are part of. This functionality is required if we are going to get good multi-directional threat intelligence sharing happening.   - A threat sharing community member has detected an IP address while doing some local network hunting that seems to be malicious, but they are unsure if it actually is. STIX needs to be able to allow the community member to send out a 'does anyone have information they can share about this' STIX request out to the entire community, and allow any other community member to reply to the community member. The replies may be shared with the entire community, or may be sent directly to the requester.   This is different from the normal 'broadcast' style STIX message, where the message is just sent to all parties and no replies are expected. With STIX request/response there is a direct question/answer relationship required.   Please note this request/response is also different to TAXII Query, as the question is being asked to all members of the channel, rather than just the single TAXII server you are locally connecting to (which is IMHO more where TAXII Query fits in).   POTENTIAL ANSWER:   Creating a STIX Request Package and a STIX Response Package seems to be a good answer to this problem.   As I see it, a sender would have two types of questions they would want answered: - I have a 'thing' (e.g. IP address), and I to find more objects that are related to this thing so I understand it better (crowdsourced responses) - I have a particular STIX object and I would like to get the latest version of that object from the producer (particular object responses)   For the crowdsourced responses option, the STIX Request Package would contain a list of related STIX objects that the sender would like more information about. The STIX Request Package could contain something as small as a single IP address, or could contain a large slice of related data e.g. a list of 5200 Observables, Indicators, TTPs, Campaigns and Threat Actors. The STIX Request package would be sent to all recipients in the Threat Sharing Group, and any/all of the Threat Sharing Group members would be able to respond via a STIX Response package. STIX Responses from Threat Sharing Group members would be able to be sent to all Threat Sharing Group members (group reply) or sent directly back to the original STIX Request package author as a direct response (private reply). The STI Responses need to be able to say 'Yes, we've seen it, and we've included some objects that are related to it', or 'No, we've not seen it'.   For the particular object responses option, the STIX Request Package would contain a list of STIX identifiers that the sender would like more information about. The STIX Request Package would be sent directly to the producer of the object being queried. ** This relies on the fact  that STIX IDs include the producers namespace, that the namespace includes the domain name of the Producer, and that the producer has the relevant TAXII auto-discovery functionality enabled in their setup **. The producer would then look at the STIX Request Package author to determine if the proiducer wishes that information to be shared, and also check if the STIX Request Package author has the correct permissions to have access to that data. If they do then the data (or subset of the data) should be returned. This sort of STIX Request Package would always be sent back original STIX Request package author as a direct response (private reply).   Having both these features would enable more question and answers to be asked across threat sharing groups, meaning that Threat Analysts and Incident Responders would have the ability to find out more about their own particular use cases - hopefully improving the speed and effectiveness of Incident Response.   Cheers   Terry MacDonald Senior STIX Subject Matter Expert SOLTRA   An FS-ISAC and DTCC Company +61 (407) 203 206 terry@soltra.com     From: cti-stix@lists.oasis-open.org [mailto: cti-stix@lists.oasis-open.org ] On Behalf Of Barnum, Sean D. Sent: Friday, 30 October 2015 2:26 AM To: Patrick Maroney < Pmaroney@Specere.org >; Aharon Chernin < achernin@soltra.com >; Davidson II, Mark S < mdavidson@mitre.org >; Joep Gommers < joep@eclecticiq.com >; Jonathan Bush (DTCC) < jbush@dtcc.com >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] RE: STIX Sightings   I agree that RFIs (or really Request/Response scenarios in general) should be supported in the CTI ecosystem but think they are best addressed at the TAXII level and not within STIX and/or CybOX. Let’s let STIX and CybOX focus on the information going back and forth and not on the specifics of the process of how it goes back and forth.   sean   From: " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > on behalf of Patrick Maroney < Pmaroney@Specere.org > Date: Thursday, October 29, 2015 at 11:22 AM To: Aharon Chernin < achernin@soltra.com >, Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Subject: Re: [cti-stix] RE: STIX Sightings   Propose that (1) the CTI Standard should include support for and RFI (Request For Information) mechanism and (2) this could just a form/requirement of  a STIX Query Language. . Patrick Maroney     From: "Chernin, Aharon" < achernin@soltra.com > Date: Thursday, October 29, 2015 at 11:17 AM To: Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, Patrick Maroney < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Subject: Re: [cti-stix] RE: STIX Sightings   I agree that a Sighting should just be a positive, “I saw this”. I’d love to keep the complexity down here for our initial pass. I believe that implementing a negative sighting is probably going to be orders of more magnitude than a positive sighting for a tool vendor. A positive Sighting can be sent as a TAXII client operation due to the limited number of them that will be generated (ie. Not infinite) and the fact that no question is being asked. However, if we have to ask someone “Have you saw this", we will likely require the tool vendor implement a TAXII server to send these negatives.   TLDR Positive Sightings = STIX w/TAXII Client operation Negative Sightings = STIX w/TAXII Server    What if we implement RFIs using TAXII 2 query instead? We could send a TAXII query request asking if a particular observable has been seen.   Aharon   From: < cti-stix@lists.oasis-open.org > on behalf of "Davidson II, Mark S" < mdavidson@mitre.org > Date: Thursday, October 29, 2015 at 7:50 AM To: Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Subject: RE: [cti-stix] RE: STIX Sightings   The Request/Response case and the negative sighting case seem to be slightly different to me. For the request/response case, you have a request and a specific response to that request. Some form of “empty” response in that context could be sufficient for the “negative sighting” (vs. adding a field to the data model).   In terms of a sighting that was not requested (e.g., event-based exchanges, like a sensor that sends sightings as they are seen), I don’t see how a negative sighting would be useful, since there is an infinite number of things that e.g., a sensor hasn’t seen at any given point in time.   Based on the above, I see how the ability to say “I haven’t seen that” makes sense, but I’m not sold that it needs to be accomplished with a field in the sighting object.   Thank you. -Mark   From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 9:32 AM To: Bush, Jonathan < jbush@dtcc.com >; 'Patrick Maroney' < Pmaroney@Specere.org >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] RE: STIX Sightings   +1 on what Patrick and Jonathan said   From: "Bush, Jonathan" < jbush@dtcc.com > Date: Thursday, October 29, 2015 at 2:30 PM To: 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >, Joep Gommers < joep@eclecticiq.com > Subject: RE: [cti-stix] RE: STIX Sightings   So from an implementation perspective (the part I was more eluding to conversation on), we would need a “positive/negative” indicator as a mandatory field, no?  Any other implementation implications?   From: Patrick Maroney [ mailto:Pmaroney@Specere.org ] Sent: Thursday, October 29, 2015 9:29 AM To: cti-stix@lists.oasis-open.org ; Bush, Jonathan; 'Joep Gommers' Subject: Re: [cti-stix] RE: STIX Sightings   Source:  RFI: Have you seen this? Recipient: No. ...Or more nuanced: Recipient: No I looked over this period of time using this method and have this level of certainty we've not had anything matching this pattern. Patrick Maroney President Integrated Networking Technologies, Inc. Desk: (856)983-0001 Cell: (609)841-5104 Email: pmaroney@specere.org   On Thu, Oct 29, 2015 at 6:23 AM -0700, "Bush, Jonathan" < jbush@dtcc.com > wrote: A “negative sighting”?  Mind = Blown!   Can you talk about that some more?    From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 5:39 AM To: cti-stix@lists.oasis-open.org Subject: [cti-stix] STIX Sightings   Dear list,   My view on sightings:   Threat Intelligence is in part about moving unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information, the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention).   The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if – or to what extent – they have deference, defeat or preventive measures in place.   Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings: ·          Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication) ·          Sightings are either produced by machines or by humans. ·          In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting. ·          In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports, etc. In part because you can’t ASSUME that the full context is available to be sighted. ·          Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence.   Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the way I describe above – with success.    I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0.    Best regards, Joep     DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email. DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.


  • 15.  Re: [cti-stix] STIX Sightings

    Posted 10-30-2015 05:33
    I have to admit that i am not following too much TAXII now. (flood of emails, etc. well u know) And sorry posting that in cti-stix, but while related to this current topic, and also because John Doe introduced the notion of Broker, i would recommend to have a look at the IETF SACM architecture: https://datatracker.ietf.org/doc/draft-ietf-sacm-architecture/ 2015-10-30 7:53 GMT+03:00 Jordan, Bret <bret.jordan@bluecoat.com>: > Yes, I see this request / response going over the TAXII 2.0 channel > structure. Our design could handle this use case / work flow very easily. > As it is really one of my core use cases I brought up in TAXII land long > ago. That is two network devices talking back and forth. I just called > dynamic data enrichment. But it is effectively the same thing. > > Bret > > Sent from my Commodore 64 > > On Oct 29, 2015, at 10:12 PM, Jerome Athias <athiasjerome@gmail.com> wrote: > > I do understand the use cases > (Of course when i find a suspicious file, i will check its hash on > virustotal before starting analyzing it) > Now i would more imagine to send RFIs via TAXII. Where we could imagine an à > la DNS architecture of TAXII servers. For that i would imagine an API for > TAXII. > And yes of course this API mechanism can only exists if it supports > (understands) STIX/CybOX/MAEC... > > > On Friday, 30 October 2015, Terry MacDonald <terry@soltra.com> wrote: >> >> I disagree here. I think it’s a STIX problem to solve, and here’s why…. >> (apologies for the length of the email!) >> >> >> >> PROBLEM: >> >> >> >> There is no real mechanism within STIX for a consumer of STIX data to ask >> a question from the rest of the threat sharing community that they are part >> of. This functionality is required if we are going to get good >> multi-directional threat intelligence sharing happening. >> >> >> >> - A threat sharing community member has detected an IP address while doing >> some local network hunting that seems to be malicious, but they are unsure >> if it actually is. STIX needs to be able to allow the community member to >> send out a 'does anyone have information they can share about this' STIX >> request out to the entire community, and allow any other community member to >> reply to the community member. The replies may be shared with the entire >> community, or may be sent directly to the requester. >> >> >> >> This is different from the normal 'broadcast' style STIX message, where >> the message is just sent to all parties and no replies are expected. With >> STIX request/response there is a direct question/answer relationship >> required. >> >> >> >> Please note this request/response is also different to TAXII Query, as the >> question is being asked to all members of the channel, rather than just the >> single TAXII server you are locally connecting to (which is IMHO more where >> TAXII Query fits in). >> >> >> >> POTENTIAL ANSWER: >> >> >> >> Creating a STIX Request Package and a STIX Response Package seems to be a >> good answer to this problem. >> >> >> >> As I see it, a sender would have two types of questions they would want >> answered: >> >> - I have a 'thing' (e.g. IP address), and I to find more objects that are >> related to this thing so I understand it better (crowdsourced responses) >> >> - I have a particular STIX object and I would like to get the latest >> version of that object from the producer (particular object responses) >> >> >> >> For the crowdsourced responses option, the STIX Request Package would >> contain a list of related STIX objects that the sender would like more >> information about. The STIX Request Package could contain something as small >> as a single IP address, or could contain a large slice of related data e.g. >> a list of 5200 Observables, Indicators, TTPs, Campaigns and Threat Actors. >> The STIX Request package would be sent to all recipients in the Threat >> Sharing Group, and any/all of the Threat Sharing Group members would be able >> to respond via a STIX Response package. STIX Responses from Threat Sharing >> Group members would be able to be sent to all Threat Sharing Group members >> (group reply) or sent directly back to the original STIX Request package >> author as a direct response (private reply). The STI Responses need to be >> able to say 'Yes, we've seen it, and we've included some objects that are >> related to it', or 'No, we've not seen it'. >> >> >> >> For the particular object responses option, the STIX Request Package would >> contain a list of STIX identifiers that the sender would like more >> information about. The STIX Request Package would be sent directly to the >> producer of the object being queried. ** This relies on the fact that STIX >> IDs include the producers namespace, that the namespace includes the domain >> name of the Producer, and that the producer has the relevant TAXII >> auto-discovery functionality enabled in their setup **. The producer would >> then look at the STIX Request Package author to determine if the proiducer >> wishes that information to be shared, and also check if the STIX Request >> Package author has the correct permissions to have access to that data. If >> they do then the data (or subset of the data) should be returned. This sort >> of STIX Request Package would always be sent back original STIX Request >> package author as a direct response (private reply). >> >> >> >> Having both these features would enable more question and answers to be >> asked across threat sharing groups, meaning that Threat Analysts and >> Incident Responders would have the ability to find out more about their own >> particular use cases - hopefully improving the speed and effectiveness of >> Incident Response. >> >> >> >> Cheers >> >> >> >> Terry MacDonald >> >> Senior STIX Subject Matter Expert >> >> SOLTRA An FS-ISAC and DTCC Company >> >> +61 (407) 203 206 terry@soltra.com >> >> >> >> >> >> From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] >> On Behalf Of Barnum, Sean D. >> Sent: Friday, 30 October 2015 2:26 AM >> To: Patrick Maroney <Pmaroney@Specere.org>; Aharon Chernin >> <achernin@soltra.com>; Davidson II, Mark S <mdavidson@mitre.org>; Joep >> Gommers <joep@eclecticiq.com>; Jonathan Bush (DTCC) <jbush@dtcc.com>; >> cti-stix@lists.oasis-open.org >> Subject: Re: [cti-stix] RE: STIX Sightings >> >> >> >> I agree that RFIs (or really Request/Response scenarios in general) should >> be supported in the CTI ecosystem but think they are best addressed at the >> TAXII level and not within STIX and/or CybOX. >> >> Let’s let STIX and CybOX focus on the information going back and forth and >> not on the specifics of the process of how it goes back and forth. >> >> >> >> sean >> >> >> >> From: "cti-stix@lists.oasis-open.org" <cti-stix@lists.oasis-open.org> on >> behalf of Patrick Maroney <Pmaroney@Specere.org> >> Date: Thursday, October 29, 2015 at 11:22 AM >> To: Aharon Chernin <achernin@soltra.com>, Mark Davidson >> <mdavidson@mitre.org>, Joep Gommers <joep@eclecticiq.com>, "Jonathan Bush >> (DTCC)" <jbush@dtcc.com>, "cti-stix@lists.oasis-open.org" >> <cti-stix@lists.oasis-open.org> >> Subject: Re: [cti-stix] RE: STIX Sightings >> >> >> >> Propose that (1) the CTI Standard should include support for and RFI >> (Request For Information) mechanism and (2) this could just a >> form/requirement of a STIX Query Language. >> >> . >> >> Patrick Maroney >> >> >> >> >> >> From: "Chernin, Aharon" <achernin@soltra.com> >> Date: Thursday, October 29, 2015 at 11:17 AM >> To: Mark Davidson <mdavidson@mitre.org>, Joep Gommers >> <joep@eclecticiq.com>, "Jonathan Bush (DTCC)" <jbush@dtcc.com>, Patrick >> Maroney <Pmaroney@Specere.org>, "cti-stix@lists.oasis-open.org" >> <cti-stix@lists.oasis-open.org> >> Subject: Re: [cti-stix] RE: STIX Sightings >> >> >> >> I agree that a Sighting should just be a positive, “I saw this”. I’d love >> to keep the complexity down here for our initial pass. I believe that >> implementing a negative sighting is probably going to be orders of more >> magnitude than a positive sighting for a tool vendor. A positive Sighting >> can be sent as a TAXII client operation due to the limited number of them >> that will be generated (ie. Not infinite) and the fact that no question is >> being asked. However, if we have to ask someone “Have you saw this", we will >> likely require the tool vendor implement a TAXII server to send these >> negatives. >> >> >> >> TLDR >> >> Positive Sightings = STIX w/TAXII Client operation >> >> Negative Sightings = STIX w/TAXII Server >> >> >> >> What if we implement RFIs using TAXII 2 query instead? We could send a >> TAXII query request asking if a particular observable has been seen. >> >> >> >> Aharon >> >> >> >> From: <cti-stix@lists.oasis-open.org> on behalf of "Davidson II, Mark S" >> <mdavidson@mitre.org> >> Date: Thursday, October 29, 2015 at 7:50 AM >> To: Joep Gommers <joep@eclecticiq.com>, "Jonathan Bush (DTCC)" >> <jbush@dtcc.com>, 'Patrick Maroney' <Pmaroney@Specere.org>, >> "cti-stix@lists.oasis-open.org" <cti-stix@lists.oasis-open.org> >> Subject: RE: [cti-stix] RE: STIX Sightings >> >> >> >> The Request/Response case and the negative sighting case seem to be >> slightly different to me. For the request/response case, you have a request >> and a specific response to that request. Some form of “empty” response in >> that context could be sufficient for the “negative sighting” (vs. adding a >> field to the data model). >> >> >> >> In terms of a sighting that was not requested (e.g., event-based >> exchanges, like a sensor that sends sightings as they are seen), I don’t see >> how a negative sighting would be useful, since there is an infinite number >> of things that e.g., a sensor hasn’t seen at any given point in time. >> >> >> >> Based on the above, I see how the ability to say “I haven’t seen that” >> makes sense, but I’m not sold that it needs to be accomplished with a field >> in the sighting object. >> >> >> >> Thank you. >> >> -Mark >> >> >> >> From:cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] >> On Behalf Of Joep Gommers >> Sent: Thursday, October 29, 2015 9:32 AM >> To: Bush, Jonathan <jbush@dtcc.com>; 'Patrick Maroney' >> <Pmaroney@Specere.org>; cti-stix@lists.oasis-open.org >> Subject: Re: [cti-stix] RE: STIX Sightings >> >> >> >> +1 on what Patrick and Jonathan said >> >> >> >> From: "Bush, Jonathan" <jbush@dtcc.com> >> Date: Thursday, October 29, 2015 at 2:30 PM >> To: 'Patrick Maroney' <Pmaroney@Specere.org>, >> "cti-stix@lists.oasis-open.org" <cti-stix@lists.oasis-open.org>, Joep >> Gommers <joep@eclecticiq.com> >> Subject: RE: [cti-stix] RE: STIX Sightings >> >> >> >> So from an implementation perspective (the part I was more eluding to >> conversation on), we would need a “positive/negative” indicator as a >> mandatory field, no? Any other implementation implications? >> >> >> >> From: Patrick Maroney [ mailto:Pmaroney@Specere.org ] >> Sent: Thursday, October 29, 2015 9:29 AM >> To: cti-stix@lists.oasis-open.org; Bush, Jonathan; 'Joep Gommers' >> Subject: Re: [cti-stix] RE: STIX Sightings >> >> >> >> Source: RFI: Have you seen this? >> >> Recipient: No. >> >> ...Or more nuanced: >> >> Recipient: No I looked over this period of time using this method and have >> this level of certainty we've not had anything matching this pattern. >> >> Patrick Maroney >> President >> Integrated Networking Technologies, Inc. >> Desk: (856)983-0001 >> Cell: (609)841-5104 >> Email: pmaroney@specere.org >> >> >> >> >> >> >> >> On Thu, Oct 29, 2015 at 6:23 AM -0700, "Bush, Jonathan" <jbush@dtcc.com> >> wrote: >> >> A “negative sighting”? Mind = Blown! >> >> >> >> Can you talk about that some more? >> >> >> >> From:cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] >> On Behalf Of Joep Gommers >> Sent: Thursday, October 29, 2015 5:39 AM >> To: cti-stix@lists.oasis-open.org >> Subject: [cti-stix] STIX Sightings >> >> >> >> Dear list, >> >> >> >> My view on sightings: >> >> >> >> Threat Intelligence is in part about moving unknown unknown’s to known >> unknown, e.g. discovery new “threats” (ignoring for just a second the >> analytical construct of it). Part moving these known unknown, to known >> knowns, by understanding the problem well enough to meet stakeholder’s >> information needs in whatever spectrum of deterrence, defeat or prevention >> they are working. For example; the SOC (deter) requires indicator and >> warning information, the IR teams (defeat) require ad-hoc intelligence >> support and/or executives/commanders need strategic intelligence reports >> (prevention). >> >> >> >> The emerging threat intelligence or threat management function in the >> large enterprise and government institution revolves around Threat >> Management. In effect some variation of the above process with the >> additional strategic questions; are we “managing” / “in control” of the >> threats we identified. This is done in part by validating if your >> constituency is informed, effected and if – or to what extent – they have >> deference, defeat or preventive measures in place. >> >> >> >> Sightings play a part in this process, by ensuring a Threat Management >> capability can validate if – based on current information position – the >> constituency is potentially effected or not. Further analysis will determine >> if incident management is required to really judge if the organization is >> affected or not and to what extent it is managed. For me this implies a >> couple of things for STIX Sightings: >> >> · Sightings should be either positive (I’ve seen a potential >> indication of a threat) or negative (I haven’t seen an indication) >> >> · Sightings are either produced by machines or by humans. >> >> · In the interplay between man and machine, it is not a given that >> the machine is aware of every detail that can potentially be sighted (e.g. A >> specific observable). Sometimes the interpretation of an analyst is required >> to determine this. For example, a STIX indicator with nothing more then a >> rough description could be enough for a human analyst to interpret and sight >> it. Similarly, if a hypothesis is described in a report object, without any >> further technical indication or observable information, it should allow for >> human interpretation and potential sighting. >> >> · In conclusion; sightings should be thought of as MUCH wider then >> observables and indicators. Surely into TTP, Exploit Targets, Incidents, >> Reports, etc. In part because you can’t ASSUME that the full context is >> available to be sighted. >> >> · Estimative language or estimative judgement in an important >> construct to consider in the world of Sightings, Relationships and the >> future of STIX. Human judgement allows for estimate judgement and machines >> allow for probability based on pattern interpretation of STIX intelligence. >> >> >> >> Lastly, at EclecticIQ we’ve actually implemented a Sightings Object >> alongside the world of STIX objects that behaves in much of the way I >> describe above – with success. >> >> >> >> I’ll try and find time in the next two weeks to share more real-world >> lessons learned to inform STIX 2.0. >> >> >> >> Best regards, >> >> Joep >> >> >> >> >> >> >> DTCC DISCLAIMER: This email and any files transmitted with it are >> confidential and intended solely for the use of the individual or entity to >> whom they are addressed. If you have received this email in error, please >> notify us immediately and delete the email and any attachments from your >> system. The recipient should check this email and any attachments for the >> presence of viruses. The company accepts no liability for any damage caused >> by any virus transmitted by this email. >> >> >> DTCC DISCLAIMER: This email and any files transmitted with it are >> confidential and intended solely for the use of the individual or entity to >> whom they are addressed. If you have received this email in error, please >> notify us immediately and delete the email and any attachments from your >> system. The recipient should check this email and any attachments for the >> presence of viruses. The company accepts no liability for any damage caused >> by any virus transmitted by this email.


  • 16.  Re: [cti-stix] RE: STIX Sightings

    Posted 10-30-2015 04:51
    This type of functionality could enable some really interesting workflows and UI tools. Bret  Sent from my Commodore 64 On Oct 29, 2015, at 3:45 PM, Terry MacDonald < terry@soltra.com > wrote: I disagree here. I think it’s a STIX problem to solve, and here’s why…. (apologies for the length of the email!)   PROBLEM:   There is no real mechanism within STIX for a consumer of STIX data to ask a question from the rest of the threat sharing community that they are part of. This functionality is required if we are going to get good multi-directional threat intelligence sharing happening.   - A threat sharing community member has detected an IP address while doing some local network hunting that seems to be malicious, but they are unsure if it actually is. STIX needs to be able to allow the community member to send out a 'does anyone have information they can share about this' STIX request out to the entire community, and allow any other community member to reply to the community member. The replies may be shared with the entire community, or may be sent directly to the requester.   This is different from the normal 'broadcast' style STIX message, where the message is just sent to all parties and no replies are expected. With STIX request/response there is a direct question/answer relationship required.   Please note this request/response is also different to TAXII Query, as the question is being asked to all members of the channel, rather than just the single TAXII server you are locally connecting to (which is IMHO more where TAXII Query fits in).   POTENTIAL ANSWER:   Creating a STIX Request Package and a STIX Response Package seems to be a good answer to this problem.   As I see it, a sender would have two types of questions they would want answered: - I have a 'thing' (e.g. IP address), and I to find more objects that are related to this thing so I understand it better (crowdsourced responses) - I have a particular STIX object and I would like to get the latest version of that object from the producer (particular object responses)   For the crowdsourced responses option, the STIX Request Package would contain a list of related STIX objects that the sender would like more information about. The STIX Request Package could contain something as small as a single IP address, or could contain a large slice of related data e.g. a list of 5200 Observables, Indicators, TTPs, Campaigns and Threat Actors. The STIX Request package would be sent to all recipients in the Threat Sharing Group, and any/all of the Threat Sharing Group members would be able to respond via a STIX Response package. STIX Responses from Threat Sharing Group members would be able to be sent to all Threat Sharing Group members (group reply) or sent directly back to the original STIX Request package author as a direct response (private reply). The STI Responses need to be able to say 'Yes, we've seen it, and we've included some objects that are related to it', or 'No, we've not seen it'.   For the particular object responses option, the STIX Request Package would contain a list of STIX identifiers that the sender would like more information about. The STIX Request Package would be sent directly to the producer of the object being queried. ** This relies on the fact  that STIX IDs include the producers namespace, that the namespace includes the domain name of the Producer, and that the producer has the relevant TAXII auto-discovery functionality enabled in their setup **. The producer would then look at the STIX Request Package author to determine if the proiducer wishes that information to be shared, and also check if the STIX Request Package author has the correct permissions to have access to that data. If they do then the data (or subset of the data) should be returned. This sort of STIX Request Package would always be sent back original STIX Request package author as a direct response (private reply).   Having both these features would enable more question and answers to be asked across threat sharing groups, meaning that Threat Analysts and Incident Responders would have the ability to find out more about their own particular use cases - hopefully improving the speed and effectiveness of Incident Response.   Cheers   Terry MacDonald Senior STIX Subject Matter Expert SOLTRA   An FS-ISAC and DTCC Company +61 (407) 203 206 terry@soltra.com     From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Barnum, Sean D. Sent: Friday, 30 October 2015 2:26 AM To: Patrick Maroney < Pmaroney@Specere.org >; Aharon Chernin < achernin@soltra.com >; Davidson II, Mark S < mdavidson@mitre.org >; Joep Gommers < joep@eclecticiq.com >; Jonathan Bush (DTCC) < jbush@dtcc.com >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] RE: STIX Sightings   I agree that RFIs (or really Request/Response scenarios in general) should be supported in the CTI ecosystem but think they are best addressed at the TAXII level and not within STIX and/or CybOX. Let’s let STIX and CybOX focus on the information going back and forth and not on the specifics of the process of how it goes back and forth.   sean   From: " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > on behalf of Patrick Maroney < Pmaroney@Specere.org > Date: Thursday, October 29, 2015 at 11:22 AM To: Aharon Chernin < achernin@soltra.com >, Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Subject: Re: [cti-stix] RE: STIX Sightings   Propose that (1) the CTI Standard should include support for and RFI (Request For Information) mechanism and (2) this could just a form/requirement of  a STIX Query Language. . Patrick Maroney     From: "Chernin, Aharon" < achernin@soltra.com > Date: Thursday, October 29, 2015 at 11:17 AM To: Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, Patrick Maroney < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Subject: Re: [cti-stix] RE: STIX Sightings   I agree that a Sighting should just be a positive, “I saw this”. I’d love to keep the complexity down here for our initial pass. I believe that implementing a negative sighting is probably going to be orders of more magnitude than a positive sighting for a tool vendor. A positive Sighting can be sent as a TAXII client operation due to the limited number of them that will be generated (ie. Not infinite) and the fact that no question is being asked. However, if we have to ask someone “Have you saw this", we will likely require the tool vendor implement a TAXII server to send these negatives.   TLDR Positive Sightings = STIX w/TAXII Client operation Negative Sightings = STIX w/TAXII Server    What if we implement RFIs using TAXII 2 query instead? We could send a TAXII query request asking if a particular observable has been seen.   Aharon   From: < cti-stix@lists.oasis-open.org > on behalf of "Davidson II, Mark S" < mdavidson@mitre.org > Date: Thursday, October 29, 2015 at 7:50 AM To: Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Subject: RE: [cti-stix] RE: STIX Sightings   The Request/Response case and the negative sighting case seem to be slightly different to me. For the request/response case, you have a request and a specific response to that request. Some form of “empty” response in that context could be sufficient for the “negative sighting” (vs. adding a field to the data model).   In terms of a sighting that was not requested (e.g., event-based exchanges, like a sensor that sends sightings as they are seen), I don’t see how a negative sighting would be useful, since there is an infinite number of things that e.g., a sensor hasn’t seen at any given point in time.   Based on the above, I see how the ability to say “I haven’t seen that” makes sense, but I’m not sold that it needs to be accomplished with a field in the sighting object.   Thank you. -Mark   From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 9:32 AM To: Bush, Jonathan < jbush@dtcc.com >; 'Patrick Maroney' < Pmaroney@Specere.org >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] RE: STIX Sightings   +1 on what Patrick and Jonathan said   From: "Bush, Jonathan" < jbush@dtcc.com > Date: Thursday, October 29, 2015 at 2:30 PM To: 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >, Joep Gommers < joep@eclecticiq.com > Subject: RE: [cti-stix] RE: STIX Sightings   So from an implementation perspective (the part I was more eluding to conversation on), we would need a “positive/negative” indicator as a mandatory field, no?  Any other implementation implications?   From: Patrick Maroney [ mailto:Pmaroney@Specere.org ] Sent: Thursday, October 29, 2015 9:29 AM To: cti-stix@lists.oasis-open.org ; Bush, Jonathan; 'Joep Gommers' Subject: Re: [cti-stix] RE: STIX Sightings   Source:  RFI: Have you seen this? Recipient: No. ...Or more nuanced: Recipient: No I looked over this period of time using this method and have this level of certainty we've not had anything matching this pattern. Patrick Maroney President Integrated Networking Technologies, Inc. Desk: (856)983-0001 Cell: (609)841-5104 Email: pmaroney@specere.org   On Thu, Oct 29, 2015 at 6:23 AM -0700, "Bush, Jonathan" < jbush@dtcc.com > wrote: A “negative sighting”?  Mind = Blown!   Can you talk about that some more?    From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 5:39 AM To: cti-stix@lists.oasis-open.org Subject: [cti-stix] STIX Sightings   Dear list,   My view on sightings:   Threat Intelligence is in part about moving unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information, the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention).   The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if – or to what extent – they have deference, defeat or preventive measures in place.   Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings: ·          Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication) ·          Sightings are either produced by machines or by humans. ·          In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting. ·          In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports, etc. In part because you can’t ASSUME that the full context is available to be sighted. ·          Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence.   Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the way I describe above – with success.    I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0.    Best regards, Joep     DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email. DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.


  • 17.  Re: [cti-stix] RE: STIX Sightings

    Posted 10-30-2015 08:29
    I’m with Terry that this is a STIX use-case as much as a TAXII use-case to facilitate. 1) If I look at our own customers and prospects (noting we’ve already implemented this process/entity) its not a given TAXII is even available in the ecosystem or possible to be implemented. STIX threat models (e.g. Information about threats and security information that inform the threat model) should be able to be informed by non TAXII transport mechanisms. 2) It has nothing to do with transportation, its purely a threat model information position. Just like the incident object, it describes contextual information (to what extent something was effected or not, how it was resolved or not, etc.) to threat information in order to inform the entire set of stakeholders relevant for a threat intelligence model as we try and describe in STIX. Although the whole request/answer chain (like tasking) should not be in the model, the resulting information position should in our opinion. J- From: Terry MacDonald < terry@soltra.com > Date: Thursday, October 29, 2015 at 10:45 PM To: "Barnum, Sean D." < sbarnum@mitre.org >, Patrick Maroney < Pmaroney@Specere.org >, Aharon Chernin < achernin@soltra.com >, "Davidson II, Mark S" < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Subject: RE: [cti-stix] RE: STIX Sightings I disagree here. I think it’s a STIX problem to solve, and here’s why…. (apologies for the length of the email!)   PROBLEM:   There is no real mechanism within STIX for a consumer of STIX data to ask a question from the rest of the threat sharing community that they are part of. This functionality is required if we are going to get good multi-directional threat intelligence sharing happening.   - A threat sharing community member has detected an IP address while doing some local network hunting that seems to be malicious, but they are unsure if it actually is. STIX needs to be able to allow the community member to send out a 'does anyone have information they can share about this' STIX request out to the entire community, and allow any other community member to reply to the community member. The replies may be shared with the entire community, or may be sent directly to the requester.   This is different from the normal 'broadcast' style STIX message, where the message is just sent to all parties and no replies are expected. With STIX request/response there is a direct question/answer relationship required.   Please note this request/response is also different to TAXII Query, as the question is being asked to all members of the channel, rather than just the single TAXII server you are locally connecting to (which is IMHO more where TAXII Query fits in).   POTENTIAL ANSWER:   Creating a STIX Request Package and a STIX Response Package seems to be a good answer to this problem.   As I see it, a sender would have two types of questions they would want answered: - I have a 'thing' (e.g. IP address), and I to find more objects that are related to this thing so I understand it better (crowdsourced responses) - I have a particular STIX object and I would like to get the latest version of that object from the producer (particular object responses)   For the crowdsourced responses option, the STIX Request Package would contain a list of related STIX objects that the sender would like more information about. The STIX Request Package could contain something as small as a single IP address, or could contain a large slice of related data e.g. a list of 5200 Observables, Indicators, TTPs, Campaigns and Threat Actors. The STIX Request package would be sent to all recipients in the Threat Sharing Group, and any/all of the Threat Sharing Group members would be able to respond via a STIX Response package. STIX Responses from Threat Sharing Group members would be able to be sent to all Threat Sharing Group members (group reply) or sent directly back to the original STIX Request package author as a direct response (private reply). The STI Responses need to be able to say 'Yes, we've seen it, and we've included some objects that are related to it', or 'No, we've not seen it'.   For the particular object responses option, the STIX Request Package would contain a list of STIX identifiers that the sender would like more information about. The STIX Request Package would be sent directly to the producer of the object being queried. ** This relies on the fact  that STIX IDs include the producers namespace, that the namespace includes the domain name of the Producer, and that the producer has the relevant TAXII auto-discovery functionality enabled in their setup **. The producer would then look at the STIX Request Package author to determine if the proiducer wishes that information to be shared, and also check if the STIX Request Package author has the correct permissions to have access to that data. If they do then the data (or subset of the data) should be returned. This sort of STIX Request Package would always be sent back original STIX Request package author as a direct response (private reply).   Having both these features would enable more question and answers to be asked across threat sharing groups, meaning that Threat Analysts and Incident Responders would have the ability to find out more about their own particular use cases - hopefully improving the speed and effectiveness of Incident Response.   Cheers   Terry MacDonald Senior STIX Subject Matter Expert SOLTRA   An FS-ISAC and DTCC Company +61 (407) 203 206 terry@soltra.com     From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Barnum, Sean D. Sent: Friday, 30 October 2015 2:26 AM To: Patrick Maroney < Pmaroney@Specere.org >; Aharon Chernin < achernin@soltra.com >; Davidson II, Mark S < mdavidson@mitre.org >; Joep Gommers < joep@eclecticiq.com >; Jonathan Bush (DTCC) < jbush@dtcc.com >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] RE: STIX Sightings   I agree that RFIs (or really Request/Response scenarios in general) should be supported in the CTI ecosystem but think they are best addressed at the TAXII level and not within STIX and/or CybOX. Let’s let STIX and CybOX focus on the information going back and forth and not on the specifics of the process of how it goes back and forth.   sean   From: " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > on behalf of Patrick Maroney < Pmaroney@Specere.org > Date: Thursday, October 29, 2015 at 11:22 AM To: Aharon Chernin < achernin@soltra.com >, Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Subject: Re: [cti-stix] RE: STIX Sightings   Propose that (1) the CTI Standard should include support for and RFI (Request For Information) mechanism and (2) this could just a form/requirement of  a STIX Query Language. . Patrick Maroney     From: "Chernin, Aharon" < achernin@soltra.com > Date: Thursday, October 29, 2015 at 11:17 AM To: Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, Patrick Maroney < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Subject: Re: [cti-stix] RE: STIX Sightings   I agree that a Sighting should just be a positive, “I saw this”. I’d love to keep the complexity down here for our initial pass. I believe that implementing a negative sighting is probably going to be orders of more magnitude than a positive sighting for a tool vendor. A positive Sighting can be sent as a TAXII client operation due to the limited number of them that will be generated (ie. Not infinite) and the fact that no question is being asked. However, if we have to ask someone “Have you saw this", we will likely require the tool vendor implement a TAXII server to send these negatives.   TLDR Positive Sightings = STIX w/TAXII Client operation Negative Sightings = STIX w/TAXII Server    What if we implement RFIs using TAXII 2 query instead? We could send a TAXII query request asking if a particular observable has been seen.   Aharon   From: < cti-stix@lists.oasis-open.org > on behalf of "Davidson II, Mark S" < mdavidson@mitre.org > Date: Thursday, October 29, 2015 at 7:50 AM To: Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Subject: RE: [cti-stix] RE: STIX Sightings   The Request/Response case and the negative sighting case seem to be slightly different to me. For the request/response case, you have a request and a specific response to that request. Some form of “empty” response in that context could be sufficient for the “negative sighting” (vs. adding a field to the data model).   In terms of a sighting that was not requested (e.g., event-based exchanges, like a sensor that sends sightings as they are seen), I don’t see how a negative sighting would be useful, since there is an infinite number of things that e.g., a sensor hasn’t seen at any given point in time.   Based on the above, I see how the ability to say “I haven’t seen that” makes sense, but I’m not sold that it needs to be accomplished with a field in the sighting object.   Thank you. -Mark   From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 9:32 AM To: Bush, Jonathan < jbush@dtcc.com >; 'Patrick Maroney' < Pmaroney@Specere.org >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] RE: STIX Sightings   +1 on what Patrick and Jonathan said   From: "Bush, Jonathan" < jbush@dtcc.com > Date: Thursday, October 29, 2015 at 2:30 PM To: 'Patrick Maroney' < Pmaroney@Specere.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >, Joep Gommers < joep@eclecticiq.com > Subject: RE: [cti-stix] RE: STIX Sightings   So from an implementation perspective (the part I was more eluding to conversation on), we would need a “positive/negative” indicator as a mandatory field, no?  Any other implementation implications?   From: Patrick Maroney [ mailto:Pmaroney@Specere.org ] Sent: Thursday, October 29, 2015 9:29 AM To: cti-stix@lists.oasis-open.org ; Bush, Jonathan; 'Joep Gommers' Subject: Re: [cti-stix] RE: STIX Sightings   Source:  RFI: Have you seen this? Recipient: No. ...Or more nuanced: Recipient: No I looked over this period of time using this method and have this level of certainty we've not had anything matching this pattern. Patrick Maroney President Integrated Networking Technologies, Inc. Desk: (856)983-0001 Cell: (609)841-5104 Email: pmaroney@specere.org   On Thu, Oct 29, 2015 at 6:23 AM -0700, "Bush, Jonathan" < jbush@dtcc.com > wrote: A “negative sighting”?  Mind = Blown!   Can you talk about that some more?    From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Joep Gommers Sent: Thursday, October 29, 2015 5:39 AM To: cti-stix@lists.oasis-open.org Subject: [cti-stix] STIX Sightings   Dear list,   My view on sightings:   Threat Intelligence is in part about moving unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information, the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention).   The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if – or to what extent – they have deference, defeat or preventive measures in place.   Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings: ·          Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication) ·          Sightings are either produced by machines or by humans. ·          In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting. ·          In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports, etc. In part because you can’t ASSUME that the full context is available to be sighted. ·          Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence.   Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the way I describe above – with success.    I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0.    Best regards, Joep     DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email. DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email.


  • 18.  Re: [cti-stix] STIX Sightings

    Posted 10-30-2015 15:45
    Really good points Joep....  We can not assume that people will use TAXII... I would hope that we can make TAXII so easy that people will want to use it, but we can not assume they can or will.  I can see people sending STIX blobs over email and then having people copy-n-paste that blob in to their tool.   Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Oct 30, 2015, at 02:28, Joep Gommers < joep@eclecticiq.com > wrote: I’m with Terry that this is a STIX use-case as much as a TAXII use-case to facilitate. 1) If I look at our own customers and prospects (noting we’ve already implemented this process/entity) its not a given TAXII is even available in the ecosystem or possible to be implemented. STIX threat models (e.g. Information about threats and security information that inform the threat model) should be able to be informed by non TAXII transport mechanisms. 2) It has nothing to do with transportation, its purely a threat model information position. Just like the incident object, it describes contextual information (to what extent something was effected or not, how it was resolved or not, etc.) to threat information in order to inform the entire set of stakeholders relevant for a threat intelligence model as we try and describe in STIX. Although the whole request/answer chain (like tasking) should not be in the model, the resulting information position should in our opinion. J- From:   Terry MacDonald < terry@soltra.com > Date:   Thursday, October 29, 2015 at 10:45 PM To:   Barnum, Sean D. < sbarnum@mitre.org >, Patrick Maroney < Pmaroney@Specere.org >, Aharon Chernin < achernin@soltra.com >, Davidson II, Mark S < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, Jonathan Bush (DTCC) < jbush@dtcc.com >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Subject:   RE: [cti-stix] RE: STIX Sightings I disagree here. I think it’s a STIX problem to solve, and here’s why…. (apologies for the length of the email!)   PROBLEM:   There is no real mechanism within STIX for a consumer of STIX data to ask a question from the rest of the threat sharing community that they are part of. This functionality is required if we are going to get good multi-directional threat intelligence sharing happening.   - A threat sharing community member has detected an IP address while doing some local network hunting that seems to be malicious, but they are unsure if it actually is. STIX needs to be able to allow the community member to send out a 'does anyone have information they can share about this' STIX request out to the entire community, and allow any other community member to reply to the community member. The replies may be shared with the entire community, or may be sent directly to the requester.   This is different from the normal 'broadcast' style STIX message, where the message is just sent to all parties and no replies are expected. With STIX request/response there is a direct question/answer relationship required.   Please note this request/response is also different to TAXII Query, as the question is being asked to all members of the channel, rather than just the single TAXII server you are locally connecting to (which is IMHO more where TAXII Query fits in).   POTENTIAL ANSWER:   Creating a STIX Request Package and a STIX Response Package seems to be a good answer to this problem.   As I see it, a sender would have two types of questions they would want answered: - I have a 'thing' (e.g. IP address), and I to find more objects that are related to this thing so I understand it better (crowdsourced responses) - I have a particular STIX object and I would like to get the latest version of that object from the producer (particular object responses)   For the crowdsourced responses option, the STIX Request Package would contain a list of related STIX objects that the sender would like more information about. The STIX Request Package could contain something as small as a single IP address, or could contain a large slice of related data e.g. a list of 5200 Observables, Indicators, TTPs, Campaigns and Threat Actors. The STIX Request package would be sent to all recipients in the Threat Sharing Group, and any/all of the Threat Sharing Group members would be able to respond via a STIX Response package. STIX Responses from Threat Sharing Group members would be able to be sent to all Threat Sharing Group members (group reply) or sent directly back to the original STIX Request package author as a direct response (private reply). The STI Responses need to be able to say 'Yes, we've seen it, and we've included some objects that are related to it', or 'No, we've not seen it'.   For the particular object responses option, the STIX Request Package would contain a list of STIX identifiers that the sender would like more information about. The STIX Request Package would be sent directly to the producer of the object being queried. ** This relies on the fact  that STIX IDs include the producers namespace, that the namespace includes the domain name of the Producer, and that the producer has the relevant TAXII auto-discovery functionality enabled in their setup **. The producer would then look at the STIX Request Package author to determine if the proiducer wishes that information to be shared, and also check if the STIX Request Package author has the correct permissions to have access to that data. If they do then the data (or subset of the data) should be returned. This sort of STIX Request Package would always be sent back original STIX Request package author as a direct response (private reply).   Having both these features would enable more question and answers to be asked across threat sharing groups, meaning that Threat Analysts and Incident Responders would have the ability to find out more about their own particular use cases - hopefully improving the speed and effectiveness of Incident Response.   Cheers   Terry MacDonald Senior STIX Subject Matter Expert SOLTRA   An FS-ISAC and DTCC Company +61 (407) 203 206   terry@soltra.com     From:   cti-stix@lists.oasis-open.org   [ mailto:cti-stix@lists.oasis-open.org ]   On Behalf Of   Barnum, Sean D. Sent:   Friday, 30 October 2015 2:26 AM To:   Patrick Maroney < Pmaroney@Specere.org >; Aharon Chernin < achernin@soltra.com >; Davidson II, Mark S < mdavidson@mitre.org >; Joep Gommers < joep@eclecticiq.com >; Jonathan Bush (DTCC) < jbush@dtcc.com >;   cti-stix@lists.oasis-open.org Subject:   Re: [cti-stix] RE: STIX Sightings   I agree that RFIs (or really Request/Response scenarios in general) should be supported in the CTI ecosystem but think they are best addressed at the TAXII level and not within STIX and/or CybOX. Let’s let STIX and CybOX focus on the information going back and forth and not on the specifics of the process of how it goes back and forth.   sean   From:   cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > on behalf of Patrick Maroney < Pmaroney@Specere.org > Date:   Thursday, October 29, 2015 at 11:22 AM To:   Aharon Chernin < achernin@soltra.com >, Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, Jonathan Bush (DTCC) < jbush@dtcc.com >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Subject:   Re: [cti-stix] RE: STIX Sightings   Propose that (1) the CTI Standard should include support for and RFI (Request For Information) mechanism and (2) this could just a form/requirement of  a STIX Query Language. . Patrick Maroney     From:   Chernin, Aharon < achernin@soltra.com > Date:   Thursday, October 29, 2015 at 11:17 AM To:   Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, Jonathan Bush (DTCC) < jbush@dtcc.com >, Patrick Maroney < Pmaroney@Specere.org >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Subject:   Re: [cti-stix] RE: STIX Sightings   I agree that a Sighting should just be a positive, “I saw this”. I’d love to keep the complexity down here for our initial pass. I believe that implementing a negative sighting is probably going to be orders of more magnitude than a positive sighting for a tool vendor. A positive Sighting can be sent as a TAXII client operation due to the limited number of them that will be generated (ie. Not infinite) and the fact that no question is being asked. However, if we have to ask someone “Have you saw this , we will likely require the tool vendor implement a TAXII server to send these negatives.   TLDR Positive Sightings = STIX w/TAXII Client operation Negative Sightings = STIX w/TAXII Server    What if we implement RFIs using TAXII 2 query instead? We could send a TAXII query request asking if a particular observable has been seen.   Aharon   From:   < cti-stix@lists.oasis-open.org > on behalf of Davidson II, Mark S < mdavidson@mitre.org > Date:   Thursday, October 29, 2015 at 7:50 AM To:   Joep Gommers < joep@eclecticiq.com >, Jonathan Bush (DTCC) < jbush@dtcc.com >, 'Patrick Maroney' < Pmaroney@Specere.org >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Subject:   RE: [cti-stix] RE: STIX Sightings   The Request/Response case and the negative sighting case seem to be slightly different to me. For the request/response case, you have a request and a specific response to that request. Some form of “empty” response in that context could be sufficient for the “negative sighting” (vs. adding a field to the data model).   In terms of a sighting that was not requested (e.g., event-based exchanges, like a sensor that sends sightings as they are seen), I don’t see how a negative sighting would be useful, since there is an infinite number of things that e.g., a sensor hasn’t seen at any given point in time.   Based on the above, I see how the ability to say “I haven’t seen that” makes sense, but I’m not sold that it needs to be accomplished with a field in the sighting object.     Thank you. -Mark   From: cti-stix@lists.oasis-open.org   [ mailto:cti-stix@lists.oasis-open.org ]   On Behalf Of   Joep Gommers Sent:   Thursday, October 29, 2015 9:32 AM To:   Bush, Jonathan < jbush@dtcc.com >; 'Patrick Maroney' < Pmaroney@Specere.org >;   cti-stix@lists.oasis-open.org Subject:   Re: [cti-stix] RE: STIX Sightings   +1 on what Patrick and Jonathan said   From:   Bush, Jonathan < jbush@dtcc.com > Date:   Thursday, October 29, 2015 at 2:30 PM To:   'Patrick Maroney' < Pmaroney@Specere.org >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org >, Joep Gommers < joep@eclecticiq.com > Subject:   RE: [cti-stix] RE: STIX Sightings   So from an implementation perspective (the part I was more eluding to conversation on), we would need a “positive/negative” indicator as a mandatory field, no?  Any other implementation implications?   From:   Patrick Maroney [ mailto:Pmaroney@Specere.org ]   Sent:   Thursday, October 29, 2015 9:29 AM To:   cti-stix@lists.oasis-open.org ; Bush, Jonathan; 'Joep Gommers' Subject:   Re: [cti-stix] RE: STIX Sightings   Source:  RFI: Have you seen this? Recipient: No. ...Or more nuanced: Recipient: No I looked over this period of time using this method and have this level of certainty we've not had anything matching this pattern. Patrick Maroney President Integrated Networking Technologies, Inc. Desk:   (856)983-0001 Cell:   (609)841-5104 Email:   pmaroney@specere.org   On Thu, Oct 29, 2015 at 6:23 AM -0700, Bush, Jonathan < jbush@dtcc.com > wrote: A “negative sighting”?  Mind = Blown!   Can you talk about that some more?    From: cti-stix@lists.oasis-open.org   [ mailto:cti-stix@lists.oasis-open.org ]   On Behalf Of   Joep Gommers Sent:   Thursday, October 29, 2015 5:39 AM To:   cti-stix@lists.oasis-open.org Subject:   [cti-stix] STIX Sightings   Dear list,   My view on sightings:   Threat Intelligence is in part about moving   unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these   known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information, the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention).   The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if – or to what extent – they have deference, defeat or preventive measures in place.   Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings: ·            Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication) ·            Sightings are either produced by machines or by humans. ·            In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting. ·            In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports, etc. In part because you can’t ASSUME that the full context is available to be sighted. ·            Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence.   Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the way I describe above – with success.    I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0.    Best regards, Joep     DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email. DTCC DISCLAIMER: This email and any files transmitted with it are confidential and intended solely for the use of the individual or entity to whom they are addressed. If you have received this email in error, please notify us immediately and delete the email and any attachments from your system. The recipient should check this email and any attachments for the presence of viruses.  The company accepts no liability for any damage caused by any virus transmitted by this email. Attachment: signature.asc Description: Message signed with OpenPGP using GPGMail


  • 19.  Re: [cti-stix] RE: STIX Sightings

    Posted 10-30-2015 08:56
    On 29.10.2015 21:45:21, Terry MacDonald wrote: > > PROBLEM: > > There is no real mechanism within STIX for a consumer of STIX data > to ask a question from the rest of the threat sharing community that > they are part of. This functionality is required if we are going to > get good multi-directional threat intelligence sharing happening. > Wow, this is good stuff, Terry! I hadn't fully thought through the notion of a broadcast query. Good on ya, man! > > This is different from the normal 'broadcast' style STIX message, > where the message is just sent to all parties and no replies are > expected. With STIX request/response there is a direct > question/answer relationship required. > > Please note this request/response is also different to TAXII Query, > as the question is being asked to all members of the channel, rather > than just the single TAXII server you are locally connecting to > (which is IMHO more where TAXII Query fits in). > I'm biased, since I've been working on the notional query spec for TAXII 2.0, but I think we can solve this via TAXII REST query instead of creating two new top-level STIX objects. I've written up my proposal for query scoping here [0]. The tl;dr is to add an optional 'broadcast' parameter to TAXII query. If not specified, assume that a query is targeting just the local CTI repository. If the flag is specified, the CTI repository receiving the query acts as a proxy, forwarding the incoming query to all the hosts implied by the specified trustgroup(s), collecting the query results, and passing them back to the client. [0]: https://taxiiproject.github.io/taxii2/notional-query-api/#query-scoping -- Cheers, Trey -- Trey Darley Senior Security Engineer 4DAA 0A88 34BC 27C9 FD2B A97E D3C6 5C74 0FB7 E430 Soltra An FS-ISAC & DTCC Company www.soltra.com -- "There are only two hard things in Computer Science: cache invalidation and naming things." --Phil Karlton Attachment: signature.asc Description: PGP signature


  • 20.  RE: [cti-stix] RE: STIX Sightings

    Posted 10-30-2015 11:55
    Copying cti-taxii on the reply. The current state of the TAXII 2 conversation is that essentially this: * There will be a channel-based API for broadcasting messages * There will be TAXII messages and workflows, but we haven’t defined any yet * There are certain cases (e.g., get by ID) that seem to fit much better into a straight-up request/response API vs. the channel-based concept The TAXII SC is currently working through what the difference really is between the Channel API and the Query API, and what that means for the TAXII SC (really, CTI TC) work products - do we need both types of API? If so, do they belong in different specs? I personally think that some form of a "STIX Repository API" is worth considering. I call it that because the URL structure would be intrinsically linked to STIX (e.g., GET /indicators/<indicator-id>/ ). I personally don't care which SC the work is done in, as long as we are doing valuable work that makes sense and advances STIX/TAXII. The notion of a "STIX Repo API" probably sits right on the STIX/TAXII scope boundary for most people. > The tl;dr is to add an optional 'broadcast' parameter to TAXII query. > If not specified, assume that a query is targeting just the local CTI > repository. If the flag is specified, the CTI repository receiving the > query acts as a proxy, forwarding the incoming query to all the hosts > implied by the specified trustgroup(s), collecting the query results, > and passing them back to the client. Alternatively (and I'm not sure how well this would actually work, I'm just putting it out there for discussion), if you had a STIX Repo API and a TAXII Channel API, the client would know whether the request was "direct" or "broadcast" based on which URL it was asking. **I think they key consideration here is whether a TAXII Server is a repository, a message broker, or both** - partly, this is what's under discussion in the TAXII SC. TAXII 1.x sort-of folded both concepts into the same spec. The TAXII 2 conversations started out by focusing on the message broker aspect and found that certain repository functions (e.g., get by ID) are somewhat awkward to implement over a broker (e.g., you need to broadcast a request and hope that a broker client is subscribed, and you need to be able to handle 0-* responses to your request). This has led to the recent discussion on Query API that Trey mentioned. Thank you. -Mark


  • 21.  RE: [cti-stix] RE: STIX Sightings

    Posted 10-30-2015 11:55
    Copying cti-taxii on the reply. The current state of the TAXII 2 conversation is that essentially this: * There will be a channel-based API for broadcasting messages * There will be TAXII messages and workflows, but we haven’t defined any yet * There are certain cases (e.g., get by ID) that seem to fit much better into a straight-up request/response API vs. the channel-based concept The TAXII SC is currently working through what the difference really is between the Channel API and the Query API, and what that means for the TAXII SC (really, CTI TC) work products - do we need both types of API? If so, do they belong in different specs? I personally think that some form of a "STIX Repository API" is worth considering. I call it that because the URL structure would be intrinsically linked to STIX (e.g., GET /indicators/<indicator-id>/ ). I personally don't care which SC the work is done in, as long as we are doing valuable work that makes sense and advances STIX/TAXII. The notion of a "STIX Repo API" probably sits right on the STIX/TAXII scope boundary for most people. > The tl;dr is to add an optional 'broadcast' parameter to TAXII query. > If not specified, assume that a query is targeting just the local CTI > repository. If the flag is specified, the CTI repository receiving the > query acts as a proxy, forwarding the incoming query to all the hosts > implied by the specified trustgroup(s), collecting the query results, > and passing them back to the client. Alternatively (and I'm not sure how well this would actually work, I'm just putting it out there for discussion), if you had a STIX Repo API and a TAXII Channel API, the client would know whether the request was "direct" or "broadcast" based on which URL it was asking. **I think they key consideration here is whether a TAXII Server is a repository, a message broker, or both** - partly, this is what's under discussion in the TAXII SC. TAXII 1.x sort-of folded both concepts into the same spec. The TAXII 2 conversations started out by focusing on the message broker aspect and found that certain repository functions (e.g., get by ID) are somewhat awkward to implement over a broker (e.g., you need to broadcast a request and hope that a broker client is subscribed, and you need to be able to handle 0-* responses to your request). This has led to the recent discussion on Query API that Trey mentioned. Thank you. -Mark


  • 22.  Re: [cti-stix] RE: STIX Sightings

    Posted 10-30-2015 14:39
    As a community we need to figure out: are RFIs handled through TAXII query or are they handled via something like a STIX Request Package as Terry proposes. I do tend to lean towards TAXII query, but if the community likes the STIX Request Pack approach better then we should depreciate the functionality from TAXII Query. I would like to avoid having two different ways to do the same thing. Aharon On 10/30/15, 4:55 AM, "Trey Darley" <trey@soltra.com> wrote: >On 29.10.2015 21:45:21, Terry MacDonald wrote: >> >> PROBLEM: >> >> There is no real mechanism within STIX for a consumer of STIX data >> to ask a question from the rest of the threat sharing community that >> they are part of. This functionality is required if we are going to >> get good multi-directional threat intelligence sharing happening. >> > >Wow, this is good stuff, Terry! I hadn't fully thought through the >notion of a broadcast query. Good on ya, man! > >> >> This is different from the normal 'broadcast' style STIX message, >> where the message is just sent to all parties and no replies are >> expected. With STIX request/response there is a direct >> question/answer relationship required. >> >> Please note this request/response is also different to TAXII Query, >> as the question is being asked to all members of the channel, rather >> than just the single TAXII server you are locally connecting to >> (which is IMHO more where TAXII Query fits in). >> > >I'm biased, since I've been working on the notional query spec for >TAXII 2.0, but I think we can solve this via TAXII REST query instead >of creating two new top-level STIX objects. I've written up my >proposal for query scoping here [0]. > >The tl;dr is to add an optional 'broadcast' parameter to TAXII query. >If not specified, assume that a query is targeting just the local CTI >repository. If the flag is specified, the CTI repository receiving the >query acts as a proxy, forwarding the incoming query to all the hosts >implied by the specified trustgroup(s), collecting the query results, >and passing them back to the client. > >[0]: https://taxiiproject.github.io/taxii2/notional-query-api/#query-scoping > >-- >Cheers, >Trey >-- >Trey Darley >Senior Security Engineer >4DAA 0A88 34BC 27C9 FD2B A97E D3C6 5C74 0FB7 E430 >Soltra An FS-ISAC & DTCC Company >www.soltra.com >-- >"There are only two hard things in Computer Science: cache >invalidation and naming things." --Phil Karlton


  • 23.  Re: [cti-stix] RE: STIX Sightings

    Posted 10-30-2015 14:54
    I feel like the use case around RFI is not clearly fleshed out. What parties and systems would be issuing RFI requests and under what circumstances? What parties and systems would be responding to said requests? Only once those two things are well documented and understood by all can we understand how to best service such a request. As an example of why this is important... I believe only a tiny fraction of potential TAXII client systems would ever have an ability to respond to historical RFI requests... Most would not. So maybe this RFI capability should be limited to only TAXII servers who implement a repository specification. Sent from IBM Verse Aharon Chernin --- Re: [cti-stix] RE: STIX Sightings --- From: "Aharon Chernin" <achernin@soltra.com> To: "Trey Darley" <trey@soltra.com>, "Terry MacDonald" <terry@soltra.com> Cc: "Barnum, Sean D." <sbarnum@mitre.org>, "Patrick Maroney" <Pmaroney@Specere.org>, "Davidson II, Mark S" <mdavidson@mitre.org>, "Joep Gommers" <joep@eclecticiq.com>, "Jonathan Bush (DTCC)" <jbush@dtcc.com>, cti-stix@lists.oasis-open.org Date: Fri, Oct 30, 2015 11:38 AM Subject: Re: [cti-stix] RE: STIX Sightings As a community we need to figure out: are RFIs handled through TAXII query or are they handled via something like a STIX Request Package as Terry proposes. I do tend to lean towards TAXII query, but if the community likes the STIX Request Pack approach better then we should depreciate the functionality from TAXII Query. I would like to avoid having two different ways to do the same thing. Aharon On 10/30/15, 4:55 AM, Trey Darley wrote: >On 29.10.2015 21:45:21, Terry MacDonald wrote: >> >> PROBLEM: >> >> There is no real mechanism within STIX for a consumer of STIX data >> to ask a question from the rest of the threat sharing community that >> they are part of. This functionality is required if we are going to >> get good multi-directional threat intelligence sharing happening. >> > >Wow, this is good stuff, Terry! I hadn't fully thought through the >notion of a broadcast query. Good on ya, man! > >> >> This is different from the normal 'broadcast' style STIX message, >> where the message is just sent to all parties and no replies are >> expected. With STIX request/response there is a direct >> question/answer relationship required. >> >> Please note this request/response is also different to TAXII Query, >> as the question is being asked to all members of the channel, rather >> than just the single TAXII server you are locally connecting to >> (which is IMHO more where TAXII Query fits in). >> > >I'm biased, since I've been working on the notional query spec for >TAXII 2.0, but I think we can solve this via TAXII REST query instead >of creating two new top-level STIX objects. I've written up my >proposal for query scoping here [0]. > >The tl;dr is to add an optional 'broadcast' parameter to TAXII query. >If not specified, assume that a query is targeting just the local CTI >repository. If the flag is specified, the CTI repository receiving the >query acts as a proxy, forwarding the incoming query to all the hosts >implied by the specified trustgroup(s), collecting the query results, >and passing them back to the client. > >[0]: https://taxiiproject.github.io/taxii2/notional-query-api/#query-scoping > >-- >Cheers, >Trey >-- >Trey Darley >Senior Security Engineer >4DAA 0A88 34BC 27C9 FD2B A97E D3C6 5C74 0FB7 E430 >Soltra An FS-ISAC & DTCC Company >www.soltra.com >-- > There are only two hard things in Computer Science: cache >invalidation and naming things. --Phil Karlton


  • 24.  Re: [cti-stix] RE: STIX Sightings

    Posted 10-30-2015 15:20




    Actual common use cases:



    (1) Analyst from member company of  ISAC "X" detects SpearPhish, DDOS, Scanning, etc. and want's more information from other members within ISAC "X" 


    (2) ISAC "X" Analysts send an RFI through an intermediary like  the NCI (National Council of ISACs) to all other NCI Member Sector ISACs.  What do you know about "Y", Have you seen "Z",  etc.


    (3) Analyst "A" has Malware sample and needs to submit it to Agency "B" to establish actionable IOCs ASAP.





    Patrick Maroney









    From: < cti-stix@lists.oasis-open.org > on behalf of Jason Keirstead < Jason.Keirstead@ca.ibm.com >
    Date: Friday, October 30, 2015 at 10:52 AM
    To: "Chernin, Aharon" < achernin@soltra.com >
    Cc: Trey Darley < trey@soltra.com >, Terry MacDonald < terry@soltra.com >, Sean Barnum < sbarnum@mitre.org >, Patrick
    Maroney < Pmaroney@Specere.org >, Mark Davidson < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >,
    " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Subject: Re: [cti-stix] RE: STIX Sightings





    I feel like the use case around RFI is not clearly fleshed out.

    What parties and systems would be issuing RFI requests and under what circumstances?
    What parties and systems would be responding to said requests?

    Only once those two things are well documented and understood by all can we understand how to best service such a request.

    As an example of why this is important... I believe only a tiny fraction of potential TAXII client systems would ever have an ability to respond to historical RFI requests... Most would not. So maybe this RFI capability should be limited to only TAXII servers who implement a "repository" specification.

    Sent from IBM Verse



    Aharon Chernin --- Re: [cti-stix] RE: STIX Sightings ---





    From:
    "Aharon Chernin" < achernin@soltra.com >


    To:
    "Trey Darley" < trey@soltra.com >, "Terry MacDonald" < terry@soltra.com >


    Cc:
    "Barnum, Sean D." < sbarnum@mitre.org >, "Patrick Maroney" < Pmaroney@Specere.org >, "Davidson II, Mark S" < mdavidson@mitre.org >,
    "Joep Gommers" < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >,
    cti-stix@lists.oasis-open.org


    Date:
    Fri, Oct 30, 2015 11:38 AM


    Subject:
    Re: [cti-stix] RE: STIX Sightings






    As a community we need to figure out: are RFIs handled through TAXII query or are they handled via something like a STIX Request Package as Terry proposes. I do tend to lean towards TAXII query, but if the community likes the STIX Request Pack approach better
    then we should depreciate the functionality from TAXII Query. I would like to avoid having two different ways to do the same thing. Aharon On 10/30/15, 4:55 AM, "Trey Darley"
    wrote: >On 29.10.2015 21:45:21, Terry MacDonald wrote: >> >> PROBLEM: >> >> There is no real mechanism within STIX for a consumer of STIX data >> to ask a question from the rest of the threat sharing community that >> they are part of. This
    functionality is required if we are going to >> get good multi-directional threat intelligence sharing happening. >> > >Wow, this is good stuff, Terry! I hadn't fully thought through the >notion of a broadcast query. Good on ya, man! > >> >> This is different
    from the normal 'broadcast' style STIX message, >> where the message is just sent to all parties and no replies are >> expected. With STIX request/response there is a direct >> question/answer relationship required. >> >> Please note this request/response
    is also different to TAXII Query, >> as the question is being asked to all members of the channel, rather >> than just the single TAXII server you are locally connecting to >> (which is IMHO more where TAXII Query fits in). >> > >I'm biased, since I've been
    working on the notional query spec for >TAXII 2.0, but I think we can solve this via TAXII REST query instead >of creating two new top-level STIX objects. I've written up my >proposal for query scoping here [0]. > >The tl;dr is to add an optional 'broadcast'
    parameter to TAXII query. >If not specified, assume that a query is targeting just the local CTI >repository. If the flag is specified, the CTI repository receiving the >query acts as a proxy, forwarding the incoming query to all the hosts >implied by the
    specified trustgroup(s), collecting the query results, >and passing them back to the client. > >[0]:

    https://taxiiproject.github.io/taxii2/notional-query-api/#query-scoping > >-- >Cheers, >Trey >-- >Trey Darley >Senior Security Engineer >4DAA 0A88 34BC 27C9 FD2B A97E D3C6 5C74 0FB7 E430 >Soltra An FS-ISAC & DTCC Company >www.soltra.com >-- >"There are
    only two hard things in Computer Science: cache >invalidation and naming things." --Phil Karlton










  • 25.  Re: [cti-stix] STIX Sightings

    Posted 10-30-2015 15:50
    The biggest use case I see is the human to human over STIX and TAXII.  We have a large threat research team and they do this sort of thing every day.  But they use free form data blobs over email and IM.   It would be so nice if there was a TAXII server in the sky, amazon cloud or rackspace, that threat researchers could connect to and build micro eco-systems around.  Using our TAXII API Base concept we have talked about.  Then they could have a heavy client or web client hooked up to some tools.  As they document certain things they are finding they could push a button to share or ask your peers if they know something about this.   Obviously some of this is spec related, some is implementation / deployment / process related.   Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Oct 30, 2015, at 08:52, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I feel like the use case around RFI is not clearly fleshed out. What parties and systems would be issuing RFI requests and under what circumstances? What parties and systems would be responding to said requests? Only once those two things are well documented and understood by all can we understand how to best service such a request. As an example of why this is important... I believe only a tiny fraction of potential TAXII client systems would ever have an ability to respond to historical RFI requests... Most would not. So maybe this RFI capability should be limited to only TAXII servers who implement a repository specification. Sent from IBM Verse Aharon Chernin --- Re: [cti-stix] RE: STIX Sightings ---   From: Aharon Chernin < achernin@soltra.com > To: Trey Darley < trey@soltra.com >, Terry MacDonald < terry@soltra.com > Cc: Barnum, Sean D. < sbarnum@mitre.org >, Patrick Maroney < Pmaroney@Specere.org >, Davidson II, Mark S < mdavidson@mitre.org >, Joep Gommers < joep@eclecticiq.com >, Jonathan Bush (DTCC) < jbush@dtcc.com >,   cti-stix@lists.oasis-open.org Date: Fri, Oct 30, 2015 11:38 AM Subject: Re: [cti-stix] RE: STIX Sightings As a community we need to figure out: are RFIs handled through TAXII query or are they handled via something like a STIX Request Package as Terry proposes. I do tend to lean towards TAXII query, but if the community likes the STIX Request Pack approach better then we should depreciate the functionality from TAXII Query. I would like to avoid having two different ways to do the same thing. Aharon On 10/30/15, 4:55 AM, Trey Darley   wrote: >On 29.10.2015 21:45:21, Terry MacDonald wrote: >> >> PROBLEM: >> >> There is no real mechanism within STIX for a consumer of STIX data >> to ask a question from the rest of the threat sharing community that >> they are part of. This functionality is required if we are going to >> get good multi-directional threat intelligence sharing happening. >> > >Wow, this is good stuff, Terry! I hadn't fully thought through the >notion of a broadcast query. Good on ya, man! > >> >> This is different from the normal 'broadcast' style STIX message, >> where the message is just sent to all parties and no replies are >> expected. With STIX request/response there is a direct >> question/answer relationship required. >> >> Please note this request/response is also different to TAXII Query, >> as the question is being asked to all members of the channel, rather >> than just the single TAXII server you are locally connecting to >> (which is IMHO more where TAXII Query fits in). >> > >I'm biased, since I've been working on the notional query spec for >TAXII 2.0, but I think we can solve this via TAXII REST query instead >of creating two new top-level STIX objects. I've written up my >proposal for query scoping here [0]. > >The tl;dr is to add an optional 'broadcast' parameter to TAXII query. >If not specified, assume that a query is targeting just the local CTI >repository. If the flag is specified, the CTI repository receiving the >query acts as a proxy, forwarding the incoming query to all the hosts >implied by the specified trustgroup(s), collecting the query results, >and passing them back to the client. > >[0]:   https://taxiiproject.github.io/taxii2/notional-query-api/#query-scoping   > >-- >Cheers, >Trey >-- >Trey Darley >Senior Security Engineer >4DAA 0A88 34BC 27C9 FD2B A97E D3C6 5C74 0FB7 E430 >Soltra An FS-ISAC & DTCC Company > www.soltra.com   >-- > There are only two hard things in Computer Science: cache >invalidation and naming things. --Phil Karlton Attachment: signature.asc Description: Message signed with OpenPGP using GPGMail


  • 26.  Re: [cti-stix] STIX Sightings

    Posted 10-30-2015 16:36
    (1) Analyst from member company of  ISAC "X" detects SpearPhish, DDOS, Scanning, etc. and want's more information from other members within ISAC "X"  (2) ISAC "X" Analysts send an RFI through an intermediary like  the NCI (National Council of ISACs) to all other NCI Member Sector ISACs.  What do you know about "Y", Have you seen "Z",  etc. (3) Analyst "A" has Malware sample and needs to submit it to Agency "B" to establish actionable IOCs ASAP. So essentially the primary use case is H2H. AKA: - Human A enters RFI - It gets delivered to Human B,C,D into some type of inbox - Eventually, Human B,C,D will see the request, and respond (or not)... minutes to hours to days later (?) - Said replies go to Human A It feels to me like it is a re-invention of Email? " But they use free form data blobs over email and IM. " Is the solution to simply use STIX over SMTP? I am trying to envision what the protocol is here, that makes this data flow work any better than an encrypted email. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown "Jordan, Bret" ---2015/10/30 12:49:37 PM---The biggest use case I see is the human to human over STIX and TAXII. We have a large threat resear From: "Jordan, Bret" <bret.jordan@bluecoat.com> To: Jason Keirstead/CanEast/IBM@IBMCA Cc: Aharon Chernin <achernin@soltra.com>, Trey Darley <trey@soltra.com>, Terry MacDonald <terry@soltra.com>, "Sean D. Barnum" <sbarnum@mitre.org>, Patrick Maroney <Pmaroney@Specere.org>, Mark Davidson <mdavidson@mitre.org>, Joep Gommers <joep@eclecticiq.com>, "Jonathan Bush (DTCC)" <jbush@dtcc.com>, "cti-stix@lists.oasis-open.org" <cti-stix@lists.oasis-open.org> Date: 2015/10/30 12:49 PM Subject: Re: [cti-stix] STIX Sightings The biggest use case I see is the human to human over STIX and TAXII. We have a large threat research team and they do this sort of thing every day. But they use free form data blobs over email and IM. It would be so nice if there was a TAXII server in the sky, amazon cloud or rackspace, that threat researchers could connect to and build micro eco-systems around. Using our TAXII API Base concept we have talked about. Then they could have a heavy client or web client hooked up to some tools. As they document certain things they are finding they could push a button to share or ask your peers if they know something about this. Obviously some of this is spec related, some is implementation / deployment / process related. Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." On Oct 30, 2015, at 08:52, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I feel like the use case around RFI is not clearly fleshed out. What parties and systems would be issuing RFI requests and under what circumstances? What parties and systems would be responding to said requests? Only once those two things are well documented and understood by all can we understand how to best service such a request. As an example of why this is important... I believe only a tiny fraction of potential TAXII client systems would ever have an ability to respond to historical RFI requests... Most would not. So maybe this RFI capability should be limited to only TAXII servers who implement a "repository" specification. Sent from IBM Verse Aharon Chernin --- Re: [cti-stix] RE: STIX Sightings --- From: "Aharon Chernin" < achernin@soltra.com > To: "Trey Darley" < trey@soltra.com >, "Terry MacDonald" < terry@soltra.com > Cc: "Barnum, Sean D." < sbarnum@mitre.org >, "Patrick Maroney" < Pmaroney@Specere.org >, "Davidson II, Mark S" < mdavidson@mitre.org >, "Joep Gommers" < joep@eclecticiq.com >, "Jonathan Bush (DTCC)" < jbush@dtcc.com >, cti-stix@lists.oasis-open.org Date: Fri, Oct 30, 2015 11:38 AM Subject: Re: [cti-stix] RE: STIX Sightings As a community we need to figure out: are RFIs handled through TAXII query or are they handled via something like a STIX Request Package as Terry proposes. I do tend to lean towards TAXII query, but if the community likes the STIX Request Pack approach better then we should depreciate the functionality from TAXII Query. I would like to avoid having two different ways to do the same thing. Aharon On 10/30/15, 4:55 AM, "Trey Darley" wrote: >On 29.10.2015 21:45:21, Terry MacDonald wrote: >> >> PROBLEM: >> >> There is no real mechanism within STIX for a consumer of STIX data >> to ask a question from the rest of the threat sharing community that >> they are part of. This functionality is required if we are going to >> get good multi-directional threat intelligence sharing happening. >> > >Wow, this is good stuff, Terry! I hadn't fully thought through the >notion of a broadcast query. Good on ya, man! > >> >> This is different from the normal 'broadcast' style STIX message, >> where the message is just sent to all parties and no replies are >> expected. With STIX request/response there is a direct >> question/answer relationship required. >> >> Please note this request/response is also different to TAXII Query, >> as the question is being asked to all members of the channel, rather >> than just the single TAXII server you are locally connecting to >> (which is IMHO more where TAXII Query fits in). >> > >I'm biased, since I've been working on the notional query spec for >TAXII 2.0, but I think we can solve this via TAXII REST query instead >of creating two new top-level STIX objects. I've written up my >proposal for query scoping here [0]. > >The tl;dr is to add an optional 'broadcast' parameter to TAXII query. >If not specified, assume that a query is targeting just the local CTI >repository. If the flag is specified, the CTI repository receiving the >query acts as a proxy, forwarding the incoming query to all the hosts >implied by the specified trustgroup(s), collecting the query results, >and passing them back to the client. > >[0]: https://taxiiproject.github.io/taxii2/notional-query-api/#query-scoping > >-- >Cheers, >Trey >-- >Trey Darley >Senior Security Engineer >4DAA 0A88 34BC 27C9 FD2B A97E D3C6 5C74 0FB7 E430 >Soltra An FS-ISAC & DTCC Company > www.soltra.com >-- >"There are only two hard things in Computer Science: cache >invalidation and naming things." --Phil Karlton [attachment "signature.asc" deleted by Jason Keirstead/CanEast/IBM]


  • 27.  Re: [cti-stix] STIX Sightings

    Posted 11-03-2015 04:51
    Jason: Here are some thoughts as to why H2H communications through a Threat Intel Platform works better than through encrypted email: 1. Trust circle conditions have already been worked out in advance for each of the members that have been onboarded onto a platform... therefore the human analyst can stay focused (in real time) on the problem at hand (e.g., incident response, data enrichment, TTP analysis, attribution elements synthesis, etc..) and once he/she has some information (or data) for responding to an RFI...he/she can just do it, without having to create a distribution list. 2. Trust circle conditions that have been worked out on advance may include such things as: security level data classifications  (i.e., data markings), confidence intervals (stemming from the reliability and credibility of the source), classifications for the type of information being shared (e.g., situational awareness reports, IoCs, malware artifacts, etc...). Again... if all of this is worked out in advance it saves the analyst time and energy and makes the process more efficient. 3. The size of the membership of an ISAC or ISAO may be such that an email with a large distribution list may be detected as spam ... and filtered out of a recipient's in-box. 4. The Threat Intelligence Platform can be designed to have streamlined interfaces with other network tools so findings from an RFI can be immediately uploaded to a network device (e.g., a Snort snippet). There are other reasons, as well, I'm sure. These are just a few off the top of my head. Jane Ginn, MSIA, MRP Cyber Threat Intelligence Network, Inc. jg@ctin.us


  • 28.  Re: [cti-stix] STIX Sightings

    Posted 11-03-2015 12:32
    ( For the record here - I am not actually suggesting we abandon STIX/TAXII for email or any other such thing - I am trying to trigger some debate that will hopefully allow better understanding of use cases) To counter your points below... (1), (2), and (4), while accurate, do not really have anything to do with TAXII and are more about the STIX content being transmitted. Therefore, Email or not would not preclude these... ("mailing list == trust circle") (3) is, in my opinion, grasping at straws a bit... I think this H2H use case needs to be thought out very, very thoroughly on how it would work. The way you design a protocol for instant near-real time communication between systems is not the same way you design a protocol for delayed communication between people. Its IM vs. Email. The use cases are totally different and the idea that we can make one protocol elegantly fill both use cases seems unlikely. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown "Jane Ginn - jg@ctin.us" ---2015/11/03 12:51:11 AM---Jason: Here are some thoughts as to why H2H communications through a Threat Intel Platform works bet From: "Jane Ginn - jg@ctin.us" <jg@ctin.us> To: Jason Keirstead/CanEast/IBM@IBMCA, Bret Jordan <bret.jordan@bluecoat.com> Cc: achernin@soltra.com, cti-stix@lists.oasis-open.org, jbush@dtcc.com, joep@eclecticiq.com, mdavidson@mitre.org, Pmaroney@Specere.org, sbarnum@mitre.org, terry@soltra.com, trey@soltra.com Date: 2015/11/03 12:51 AM Subject: Re: [cti-stix] STIX Sightings Sent by: <cti-stix@lists.oasis-open.org> Jason: Here are some thoughts as to why H2H communications through a Threat Intel Platform works better than through encrypted email: 1. Trust circle conditions have already been worked out in advance for each of the members that have been onboarded onto a platform... therefore the human analyst can stay focused (in real time) on the problem at hand (e.g., incident response, data enrichment, TTP analysis, attribution elements synthesis, etc..) and once he/she has some information (or data) for responding to an RFI...he/she can just do it, without having to create a distribution list. 2. Trust circle conditions that have been worked out on advance may include such things as: security level data classifications (i.e., data markings), confidence intervals (stemming from the reliability and credibility of the source), classifications for the type of information being shared (e.g., situational awareness reports, IoCs, malware artifacts, etc...). Again... if all of this is worked out in advance it saves the analyst time and energy and makes the process more efficient. 3. The size of the membership of an ISAC or ISAO may be such that an email with a large distribution list may be detected as spam ... and filtered out of a recipient's in-box. 4. The Threat Intelligence Platform can be designed to have streamlined interfaces with other network tools so findings from an RFI can be immediately uploaded to a network device (e.g., a Snort snippet). There are other reasons, as well, I'm sure. These are just a few off the top of my head. Jane Ginn, MSIA, MRP Cyber Threat Intelligence Network, Inc. jg@ctin.us


  • 29.  Re: [cti-stix] STIX Sightings

    Posted 11-03-2015 12:53
    Unlikely for sure if we don't include it in our requirements* (* this thing that we still don't have, and that we are ignoring while going JSON, and that can be informed by use cases) (no good design without clear agreed requirements imho) On Tuesday, 3 November 2015, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: ( For the record here - I am not actually suggesting we abandon STIX/TAXII for email or any other such thing - I am trying to trigger some debate that will hopefully allow better understanding of use cases) To counter your points below... (1), (2), and (4), while accurate, do not really have anything to do with TAXII and are more about the STIX content being transmitted. Therefore, Email or not would not preclude these... ("mailing list == trust circle") (3) is, in my opinion, grasping at straws a bit... I think this H2H use case needs to be thought out very, very thoroughly on how it would work. The way you design a protocol for instant near-real time communication between systems is not the same way you design a protocol for delayed communication between people. Its IM vs. Email. The use cases are totally different and the idea that we can make one protocol elegantly fill both use cases seems unlikely. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown "Jane Ginn - jg@ctin.us " ---2015/11/03 12:51:11 AM---Jason: Here are some thoughts as to why H2H communications through a Threat Intel Platform works bet From: "Jane Ginn - jg@ctin.us " < jg@ctin.us > To: Jason Keirstead/CanEast/IBM@IBMCA, Bret Jordan < bret.jordan@bluecoat.com > Cc: achernin@soltra.com , cti-stix@lists.oasis-open.org , jbush@dtcc.com , joep@eclecticiq.com , mdavidson@mitre.org , Pmaroney@Specere.org, sbarnum@mitre.org , terry@soltra.com , trey@soltra.com Date: 2015/11/03 12:51 AM Subject: Re: [cti-stix] STIX Sightings Sent by: < cti-stix@lists.oasis-open.org > Jason: Here are some thoughts as to why H2H communications through a Threat Intel Platform works better than through encrypted email: 1. Trust circle conditions have already been worked out in advance for each of the members that have been onboarded onto a platform... therefore the human analyst can stay focused (in real time) on the problem at hand (e.g., incident response, data enrichment, TTP analysis, attribution elements synthesis, etc..) and once he/she has some information (or data) for responding to an RFI...he/she can just do it, without having to create a distribution list. 2. Trust circle conditions that have been worked out on advance may include such things as: security level data classifications (i.e., data markings), confidence intervals (stemming from the reliability and credibility of the source), classifications for the type of information being shared (e.g., situational awareness reports, IoCs, malware artifacts, etc...). Again... if all of this is worked out in advance it saves the analyst time and energy and makes the process more efficient. 3. The size of the membership of an ISAC or ISAO may be such that an email with a large distribution list may be detected as spam ... and filtered out of a recipient's in-box. 4. The Threat Intelligence Platform can be designed to have streamlined interfaces with other network tools so findings from an RFI can be immediately uploaded to a network device (e.g., a Snort snippet). There are other reasons, as well, I'm sure. These are just a few off the top of my head. Jane Ginn, MSIA, MRP Cyber Threat Intelligence Network, Inc. jg@ctin.us


  • 30.  Re: [cti-stix] RE: STIX Sightings

    Posted 11-04-2015 09:25
    On 30.10.2015 15:38:42, Aharon Chernin wrote: > > I do tend to lean towards TAXII query, but if the community likes > the STIX Request Pack approach better then we should depreciate the > functionality from TAXII Query. I would like to avoid having two > different ways to do the same thing. > I agree that as a general refactoring principle we should strive for *one* way of doing things. If we elect to go with the STIX Request/Response objects Terry proposed for RFI, perhaps we should extend the concept to address all the use cases targeted by the TAXII Query API strawman and forget about REST-based TAXII Query. Given that the TAXII SC are going with a REST-based approach for 2.0, it seems a bit silly (from an implementation perspective) that I would need to create a STIX Request object, pass that to a TAXII broker, and wait around on one or more STIX Response objects to come back down the TAXII messaging bus just to find out whether a particular IP address has been seen before when a REST call would accomplish the same thing. Grrr...I *hate* to suggest it, but maybe this is a corner case where we actually *need* two different ways of doing the same thing?! -- Cheers, Trey -- Trey Darley Senior Security Engineer 4DAA 0A88 34BC 27C9 FD2B A97E D3C6 5C74 0FB7 E430 Soltra An FS-ISAC & DTCC Company www.soltra.com -- "It is always something." --RFC 1925 Attachment: signature.asc Description: PGP signature


  • 31.  Re: [cti-stix] STIX Sightings

    Posted 10-29-2015 15:12
    Would your Constituency, SOC, IR team...be Assets? ;-p To answer the strategic questions i recommand the Incident.Status (And if i remember correctly it is better in IODEF than STIX for now) On Thursday, 29 October 2015, Joep Gommers < joep@eclecticiq.com > wrote: Dear list, My view on sightings: Threat Intelligence is in part about moving unknown unknown’s to known unknown , e.g. discovery new “threats” (ignoring for just a second the analytical construct of it). Part moving these known unknown, to known knowns , by understanding the problem well enough to meet stakeholder’s information needs in whatever spectrum of deterrence, defeat or prevention they are working. For example; the SOC (deter) requires indicator and warning information, the IR teams (defeat) require ad-hoc intelligence support and/or executives/commanders need strategic intelligence reports (prevention). The emerging threat intelligence or threat management function in the large enterprise and government institution revolves around Threat Management. In effect some variation of the above process with the additional strategic questions; are we “managing” / “in control” of the threats we identified. This is done in part by validating if your constituency is informed, effected and if – or to what extent – they have deference, defeat or preventive measures in place. Sightings play a part in this process, by ensuring a Threat Management capability can validate if – based on current information position – the constituency is potentially effected or not. Further analysis will determine if incident management is required to really judge if the organization is affected or not and to what extent it is managed. For me this implies a couple of things for STIX Sightings: Sightings should be either positive (I’ve seen a potential indication of a threat) or negative (I haven’t seen an indication) Sightings are either produced by machines or by humans. In the interplay between man and machine, it is not a given that the machine is aware of every detail that can potentially be sighted (e.g. A specific observable). Sometimes the interpretation of an analyst is required to determine this. For example, a STIX indicator with nothing more then a rough description could be enough for a human analyst to interpret and sight it. Similarly, if a hypothesis is described in a report object, without any further technical indication or observable information, it should allow for human interpretation and potential sighting. In conclusion; sightings should be thought of as MUCH wider then observables and indicators. Surely into TTP, Exploit Targets, Incidents, Reports, etc. In part because you can’t ASSUME that the full context is available to be sighted. Estimative language or estimative judgement in an important construct to consider in the world of Sightings, Relationships and the future of STIX. Human judgement allows for estimate judgement and machines allow for probability based on pattern interpretation of STIX intelligence. Lastly, at EclecticIQ we’ve actually implemented a Sightings Object alongside the world of STIX objects that behaves in much of the way I describe above – with success.  I’ll try and find time in the next two weeks to share more real-world lessons learned to inform STIX 2.0.  Best regards, Joep