Sorry, forgot I was supposed to respond to this. I think I understand where you’re going with this:
Consumer receives some threat intel, including an indicator to detect the bot Consumer detects the bot Consumer asks for options for how to remediate it Producer creates the COA/Relationship pairs to indicate that they recommend the consumer take the associated COA
So this is like a one-off recommendation, specific to that sighting of the bot. It’s not a general recommendation that “if you find this bot, you can remediate it by doing X”. I think that’s what was confusing
me, I didn’t realize there were tools that were planning to recommend (but not direct) COAs to other tools for specific sightings. Hopefully I’m following that correctly anyway.
In regards to getting system information in STIX…we’d previously discussed a new “Asset” SDO to capture that information…but others thought that it was straying too far from “threat intelligence” and getting
into the asset management space. It may make sense to assume some kind of boundary object here that isn’t defined in STIX.
John
From: <
cti-stix@lists.oasis-open.org> on behalf of "Jyoti Verma (jyoverma)" <
jyoverma@cisco.com>
Date: Friday, September 15, 2017 at 3:26 PM
To: John Wunder <
jwunder@mitre.org>
Cc: "cti-stix@lists.oasis-open.org" <
cti-stix@lists.oasis-open.org>
Subject: Re: [cti-stix] Draft Threat model for IMDDOS COAs
Hi John,
The mini group has been working on identifying a couple of use cases for COA. If were to solve all of them, we would be doing this for a long time so we took a stab at putting our thoughts on timelines for
the various features. We plan to discuss this with the wider community in the Tuesday working call or the full TC meeting…still waiting to hear back on which week that will be. Hopefully that will help clarify the confusion.
John: when you say “the COA should apply to the host identified by the sighting” do you mean:
I meant This is a COA that could be taken and the producer is telling the owner of the host either as a recommendation. All the COAs in the model are recommendations for prevention of indicators or for mitigation/remediation of internal hosts.
The COA that was actually taken should also be considered but that’s not in the model as of now.
John - On your latter scenario, I’d have the same question...are you recommending the COA, directing it as part of like an orchestration capability, or reporting on it?
I see the report having recommended/suggested COAs tied to indicators, sightings, malware etc. Orchestrators might take the recommendations and add more details to the COA based on the organization policy,
situational awareness etc. This COA would go to the actuators/enforcers who will act on it and return back some response. In STIX 1.x there was the notion of Suggested, Requested and Taken COA and I think it still makes sense and we should use it in some form
either as properties or relationships.
John - Separately, I don’t think Identity really captures the concept of a “host”. Identity is really an organization or an individual, STIX deferred having an “asset” SDO to capture the concept of a host.
I wasn’t sure which SDO to use for the internal host against which the sighting was made so assumed it was the identity. We need the IP address (at that time) of the victim. The orchestrator can then try to
determine who owned that IP at that time before executing the COA. What’s the best way to get the IP/other attributes of the victim?
Thanks,
Jyoti
Technical Leader,
CTO office Security Business Group,
Cisco Systems Inc.
From: "Wunder, John A." <
jwunder@mitre.org>
Date: Friday, September 15, 2017 at 6:55 AM
To: Jyoti Verma <
jyoverma@cisco.com>, "cti-stix@lists.oasis-open.org" <
cti-stix@lists.oasis-open.org>
Subject: Re: [cti-stix] Draft Threat model for IMDDOS COAs
I think this is just me not understanding where the COA minigroup is headed, not that what you put together is confusing.
Anyway, when you say “the COA should apply to the host identified by the sighting” do you mean:
This is a COA that was
actually taken and the producer is telling others about that This is a COA that
could be taken and the producer is telling the owner of the host either as a recommendation or a command
The Damballa report had both (talked about what they did, and had some recommendations for what others could do).
On your latter scenario, I’d have the same question...are you recommending the COA, directing it as part of like an orchestration capability, or reporting on it? I think the answer might be different in the
different scenarios. Separately, I don’t think Identity really captures the concept of a “host”. Identity is really an organization or an individual, STIX deferred having an “asset” SDO to capture the concept of a host.
John
From: "Jyoti Verma (jyoverma)" <
jyoverma@cisco.com>
Date: Thursday, September 14, 2017 at 6:12 PM
To: John Wunder <
jwunder@mitre.org>, "cti-stix@lists.oasis-open.org" <
cti-stix@lists.oasis-open.org>
Subject: Re: [cti-stix] Draft Threat model for IMDDOS COAs
Hi John,
I cooked this up late last night and there is no particular reason for calling it ‘applies-to’ vs. anything else. The idea was that the COA should apply to the host identified by the sighting. In the example
shown here the COAs are atomic (delete registry key, block the process that is reaching out to the C2 domains, block the process that is reaching out to the TLD domain) and there is a higher level COA (IMDDOS malware removal) that is using these atomic COAs
(I called this relationship parent-of for lack of a better term).
We discussed this example during the mini group call today and will be updating the model for a more real use case – ie. When a sighting is made, the identified host needs to be quarantined and then a series
of steps to remove the malware need to be done. This can be captured by 2 COAs – “Quarantine host” and “Malware cleanup”. What I’m struggling with is if these COAs should be related to the Sighting or directly to the Identity (identified host). Thoughts?
Thanks,
Jyoti
Technical Leader,
CTO office Security Business Group,
Cisco Systems Inc.
From: "Wunder, John A." <
jwunder@mitre.org>
Date: Thursday, September 14, 2017 at 12:40 PM
To: Jyoti Verma <
jyoverma@cisco.com>, "cti-stix@lists.oasis-open.org" <
cti-stix@lists.oasis-open.org>
Subject: Re: [cti-stix] Draft Threat model for IMDDOS COAs
Hey Jyoti,
This is super comprehensive, thanks! I had a question for you…right now you have COA tied to Sightings as “applies-to”. What data does that indicate? That the COA was actually applied to the case described
in that sighting, or that it COULD apply? We’ve done some explorations of that concept and I was curious what you were thinking.
John
From: <
cti-stix@lists.oasis-open.org> on behalf of "Jyoti Verma (jyoverma)" <
jyoverma@cisco.com>
Date: Thursday, September 14, 2017 at 5:27 AM
To: "cti-stix@lists.oasis-open.org" <
cti-stix@lists.oasis-open.org>
Subject: [cti-stix] Draft Threat model for IMDDOS COAs
Hi,
Based on the discussions in the COA mini group, I extended Rich’s threat model for IMDDOS with some COAs and relationships. We can work through this in the COA mini group call later today.
Thanks,
Jyoti
Technical Leader,
CTO office Security Business Group,
Cisco Systems Inc.