CTI STIX Subcommittee

Expand all | Collapse all

Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

  • 1.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 15:36
    Thanks for catching this Jason.  For sightings I am not sure why you would do an ID...  Let me explain how I see the workflow going.... Firewall sees something bad..  The firewall generates an observable and emits that on to a TAXII 2.0 channel.  All of the end point devices (clients, phones, printers, ip enabled light bulbs) can see that indicator and respond with a sighting if the so desire. The sighting will have an IDREF or similar back to the objects it is referencing.  Now the original client or a message handler running on the TAXII server (if the TAXII server is a broker + query repo) could pick up and aggregate all of the sightings coming back for that original observable and either store it or do something with it.  In the TAXII server case (broker + repo) it might store the data in a database or bubble it up to an analyst for review before sending it out a different channel group.  Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Oct 30, 2015, at 06:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I know historically I have been pushing for an RFC-Compliant UUID as mandatory component of this - now i am going to backtrack on my previous argument :) I actually think that having a UUID be mandatory is not workable, and here is why: For many (most?) products looking to produce observable and sightings, there is no system-wide ID in their product that could be used to represent something like an observable. Similarly, STIX producers like embedded devices and endpoints, do not have the resources or processing capacity to start storing these relationships. As such, said producers have two options for generating sightings: a) Have a randomly-generated UUID (which is of no use to anyone in the end because it will remove all traceability and create rampant data duplication) b) Have an algorithmically derived ID based on the data (IE, any time I issue an observable for Equals 1.2.3.4, the same ID will be derived) (b) Is really the only workable ID mechanism for most products. I have recently started to run into this in practice in my own product work, so I know it is a real problem that is going to hit a lot of people if we start mandating IDs and UUIDs. Here is an assertion - why is ID even a mandatory field for a sighting? I am not sure why it is useful. If a STIX repository needs an ID for an internal record, it can generate its own in any way it wants. I am not sure why a producer needs to specify an ID. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Terry MacDonald ---2015/10/29 06:51:35 PM---Mark, That should change with the top-level relationship object. It will be quite possible to send j From: Terry MacDonald < terry@soltra.com > To: Davidson II, Mark S < mdavidson@mitre.org >, Jordan, Bret < bret.jordan@bluecoat.com >, Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >, Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >, Wunder, John A. < jwunder@mitre.org >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Date: 2015/10/29 06:51 PM Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Mark, That should change with the top-level relationship object. It will be quite possible to send just a relationship object in a package. This will mean that the consumer will need the ability to contact the original producer of the reference STIX data object to ask if they are allowed the full object rather than just the reference to it. Having the ability to find the TAXII server from just the STIX object ID is critical to allow this to happen. This functionality also allows more secretive providers to ‘hide’ their data, such that consumers can understand that relationships exist, but that only a small subset of approved consumers will have access to the actual STIX object data. It gives the ability to hide stuff. Cheers Terry MacDonald Senior STIX Subject Matter Expert SOLTRA An FS-ISAC and DTCC Company +61 (407) 203 206 terry@soltra.com From: Davidson II, Mark S [ mailto:mdavidson@mitre.org ] Sent: Friday, 30 October 2015 5:05 AM To: Jordan, Bret < bret.jordan@bluecoat.com >; Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >; cti-stix@lists.oasis-open.org Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 If want the ability to dereference arbitrary STIX IDs (for use in accessing some kind of repository, let’s say), then I think requiring a rule whereby STIX IDs can be turned into a URL could be a good requirement (Note: URLs as IDs would satisfy this requirement). While there is a concept for idref today, I personally haven’t seen an implementation that dereferences STIX IDs outside of the document containing the idref. Thank you. -Mark PS, a notional example: <stix:Indicator idref=” https://example.org/stix121/indicators/123 ”/> From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Jordan, Bret Sent: Thursday, October 29, 2015 1:03 PM To: Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Let's just make sure we do not build an ID system that is so vast that it can enumerate every atom in the known universe. Bret Sent from my Commodore 64 STIX SC Co-chair Attachment: signature.asc Description: Message signed with OpenPGP using GPGMail


  • 2.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 16:52
    So here is my question.
    " Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. " How is that firewall going to generate and persist that observable ID to be re-referenced by the "light bulb sighting"? Because if he sees the same "something bad" 1 minute, hour, or day later, he should be sending the same observable ID - otherwise, the sightings numbers would all be reset every time he sees it. IE - the problem I describe extends beyond sightings, it also extends to observables and even indicators. Most producers of this information won't have the ways and means to build a giant database (of ie. all of the IP addresses they have ever seen) so that they know they will re-use the same ID if they want to re-emit an observable. As such if they want an ID that can be re-referenceable, they will have to generate an ID based on the current data, since the current data is all they have to go on. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown "Jordan, Bret" ---2015/10/30 12:36:36 PM---Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me expla From: "Jordan, Bret" <bret.jordan@bluecoat.com> To: Jason Keirstead/CanEast/IBM@IBMCA Cc: Terry MacDonald <terry@soltra.com>, Mark Davidson <mdavidson@mitre.org>, "Sean D. Barnum" <sbarnum@mitre.org>, Jerome Athias <athiasjerome@gmail.com>, "Taylor, Marlon" <Marlon.Taylor@hq.dhs.gov>, "Wunder, John A." <jwunder@mitre.org>, "cti-stix@lists.oasis-open.org" <cti-stix@lists.oasis-open.org> Date: 2015/10/30 12:36 PM Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: <cti-stix@lists.oasis-open.org> Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me explain how I see the workflow going.... Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. All of the end point devices (clients, phones, printers, ip enabled light bulbs) can see that indicator and respond with a sighting if the so desire. The sighting will have an IDREF or similar back to the objects it is referencing. Now the original client or a message handler running on the TAXII server (if the TAXII server is a broker + query repo) could pick up and aggregate all of the sightings coming back for that original observable and either store it or do something with it. In the TAXII server case (broker + repo) it might store the data in a database or bubble it up to an analyst for review before sending it out a different channel group. Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."
    On Oct 30, 2015, at 06:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:
    I know historically I have been pushing for an RFC-Compliant UUID as mandatory component of this - now i am going to backtrack on my previous argument :) I actually think that having a UUID be mandatory is not workable, and here is why: For many (most?) products looking to produce observable and sightings, there is no system-wide "ID" in their product that could be used to represent something like an observable. Similarly, STIX producers like embedded devices and endpoints, do not have the resources or processing capacity to start storing these relationships. As such, said producers have two options for generating sightings: a) Have a randomly-generated UUID (which is of no use to anyone in the end because it will remove all traceability and create rampant data duplication) b) Have an algorithmically derived ID based on the data (IE, any time I issue an observable for Equals 1.2.3.4, the same ID will be derived) (b) Is really the only workable ID mechanism for most products. I have recently started to run into this in practice in my own product work, so I know it is a real problem that is going to hit a lot of people if we start mandating IDs and UUIDs. Here is an assertion - why is ID even a mandatory field for a sighting? I am not sure why it is useful. If a STIX repository needs an ID for an internal record, it can generate its own in any way it wants. I am not sure why a producer needs to specify an ID. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Terry MacDonald ---2015/10/29 06:51:35 PM---Mark, That should change with the top-level relationship object. It will be quite possible to send j From: Terry MacDonald < terry@soltra.com > To: "Davidson II, Mark S" < mdavidson@mitre.org >, "Jordan, Bret" < bret.jordan@bluecoat.com >, "Barnum, Sean D." < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Date: 2015/10/29 06:51 PM Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Mark, That should change with the top-level relationship object. It will be quite possible to send just a relationship object in a package. This will mean that the consumer will need the ability to contact the original producer of the reference STIX data object to ask if they are allowed the full object rather than just the reference to it. Having the ability to find the TAXII server from just the STIX object ID is critical to allow this to happen. This functionality also allows more secretive providers to ‘hide’ their data, such that consumers can understand that relationships exist, but that only a small subset of approved consumers will have access to the actual STIX object data. It gives the ability to hide stuff. Cheers Terry MacDonald Senior STIX Subject Matter Expert SOLTRA An FS-ISAC and DTCC Company +61 (407) 203 206 terry@soltra.com From: Davidson II, Mark S [ mailto:mdavidson@mitre.org ] Sent: Friday, 30 October 2015 5:05 AM To: Jordan, Bret < bret.jordan@bluecoat.com >; Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >; cti-stix@lists.oasis-open.org Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 If want the ability to dereference arbitrary STIX IDs (for use in accessing some kind of repository, let’s say), then I think requiring a rule whereby STIX IDs can be turned into a URL could be a good requirement (Note: URLs as IDs would satisfy this requirement). While there is a concept for idref today, I personally haven’t seen an implementation that dereferences STIX IDs outside of the document containing the idref. Thank you. -Mark PS, a notional example: <stix:Indicator idref=” https://example.org/stix121/indicators/123 ”/> From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Jordan, Bret Sent: Thursday, October 29, 2015 1:03 PM To: Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Let's just make sure we do not build an ID system that is so vast that it can enumerate every atom in the known universe. Bret Sent from my Commodore 64 STIX SC Co-chair [attachment "signature.asc" deleted by Jason Keirstead/CanEast/IBM]




  • 3.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 17:24
    Really good points Jason....  It is amazing how things like this bubble up as you start writing code.  I can now see how the ID and IDREF elements will break down rapidly and fall apart in to little pieces all over the floor.  Maybe the ID and IDREF thing needs to happen in a WorkBench tool that is listening on a TAXII channel.... ???   We just need to figure out how devices can emit things they see in STIX format based on a rule or policy.   Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Oct 30, 2015, at 10:51, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: So here is my question. Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. How is that firewall going to generate and persist that observable ID to be re-referenced by the light bulb sighting ? Because if he sees the same something bad 1 minute, hour, or day later, he should be sending the same observable ID - otherwise, the sightings numbers would all be reset every time he sees it. IE - the problem I describe extends beyond sightings, it also extends to observables and even indicators. Most producers of this information won't have the ways and means to build a giant database (of ie. all of the IP addresses they have ever seen) so that they know they will re-use the same ID if they want to re-emit an observable. As such if they want an ID that can be re-referenceable, they will have to generate an ID based on the current data, since the current data is all they have to go on. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Jordan, Bret ---2015/10/30 12:36:36 PM---Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me expla From: Jordan, Bret < bret.jordan@bluecoat.com > To: Jason Keirstead/CanEast/IBM@IBMCA Cc: Terry MacDonald < terry@soltra.com >, Mark Davidson < mdavidson@mitre.org >, Sean D. Barnum < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >, Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >, Wunder, John A. < jwunder@mitre.org >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Date: 2015/10/30 12:36 PM Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me explain how I see the workflow going.... Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. All of the end point devices (clients, phones, printers, ip enabled light bulbs) can see that indicator and respond with a sighting if the so desire. The sighting will have an IDREF or similar back to the objects it is referencing. Now the original client or a message handler running on the TAXII server (if the TAXII server is a broker + query repo) could pick up and aggregate all of the sightings coming back for that original observable and either store it or do something with it. In the TAXII server case (broker + repo) it might store the data in a database or bubble it up to an analyst for review before sending it out a different channel group. Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg. On Oct 30, 2015, at 06:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I know historically I have been pushing for an RFC-Compliant UUID as mandatory component of this - now i am going to backtrack on my previous argument :) I actually think that having a UUID be mandatory is not workable, and here is why: For many (most?) products looking to produce observable and sightings, there is no system-wide ID in their product that could be used to represent something like an observable. Similarly, STIX producers like embedded devices and endpoints, do not have the resources or processing capacity to start storing these relationships. As such, said producers have two options for generating sightings: a) Have a randomly-generated UUID (which is of no use to anyone in the end because it will remove all traceability and create rampant data duplication) b) Have an algorithmically derived ID based on the data (IE, any time I issue an observable for Equals 1.2.3.4, the same ID will be derived) (b) Is really the only workable ID mechanism for most products. I have recently started to run into this in practice in my own product work, so I know it is a real problem that is going to hit a lot of people if we start mandating IDs and UUIDs. Here is an assertion - why is ID even a mandatory field for a sighting? I am not sure why it is useful. If a STIX repository needs an ID for an internal record, it can generate its own in any way it wants. I am not sure why a producer needs to specify an ID. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Terry MacDonald ---2015/10/29 06:51:35 PM---Mark, That should change with the top-level relationship object. It will be quite possible to send j From: Terry MacDonald < terry@soltra.com > To: Davidson II, Mark S < mdavidson@mitre.org >, Jordan, Bret < bret.jordan@bluecoat.com >, Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >, Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >, Wunder, John A. < jwunder@mitre.org >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Date: 2015/10/29 06:51 PM Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Mark, That should change with the top-level relationship object. It will be quite possible to send just a relationship object in a package. This will mean that the consumer will need the ability to contact the original producer of the reference STIX data object to ask if they are allowed the full object rather than just the reference to it. Having the ability to find the TAXII server from just the STIX object ID is critical to allow this to happen. This functionality also allows more secretive providers to ‘hide’ their data, such that consumers can understand that relationships exist, but that only a small subset of approved consumers will have access to the actual STIX object data. It gives the ability to hide stuff. Cheers Terry MacDonald Senior STIX Subject Matter Expert SOLTRA An FS-ISAC and DTCC Company +61 (407) 203 206 terry@soltra.com From: Davidson II, Mark S [ mailto:mdavidson@mitre.org ] Sent: Friday, 30 October 2015 5:05 AM To: Jordan, Bret < bret.jordan@bluecoat.com >; Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >; cti-stix@lists.oasis-open.org Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 If want the ability to dereference arbitrary STIX IDs (for use in accessing some kind of repository, let’s say), then I think requiring a rule whereby STIX IDs can be turned into a URL could be a good requirement (Note: URLs as IDs would satisfy this requirement). While there is a concept for idref today, I personally haven’t seen an implementation that dereferences STIX IDs outside of the document containing the idref. Thank you. -Mark PS, a notional example: <stix:Indicator idref=” https://example.org/stix121/indicators/123 ”/> From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Jordan, Bret Sent: Thursday, October 29, 2015 1:03 PM To: Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Let's just make sure we do not build an ID system that is so vast that it can enumerate every atom in the known universe. Bret Sent from my Commodore 64 STIX SC Co-chair [attachment signature.asc deleted by Jason Keirstead/CanEast/IBM] Attachment: signature.asc Description: Message signed with OpenPGP using GPGMail


  • 4.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 17:36



    Do you think tools will be doing correlation based on ID or doing correlation based on the contents of an observable?


    As an example, imagine you have a sighting for an e-mail:


    - Subject: PLS OPEN ME KTHXBYE
    - From:
    defnotaspammer@example.com
    - Attachment: (some hash)


    Then you have this other sighting:



    - Subject: PLS OPEN ME KTHXBYE
    - From:  defnotaspammer@example.com
    - Attachment: (some other hash)



    Then this one:



    - Subject: PLS OPEN ME KTHXBYE
    - From:  defnotaspammer@example.com



    Which of those should match? I feel like we’re talking about this as if sightings are either the same or different when in reality there will mostly likely be degrees of similarity (0-100). So my conclusion is that IDs, even generated based on
    the content, are probably not all that useful for matching sightings.


    That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings
    won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it.


    John



    On Oct 30, 2015, at 1:24 PM, Jordan, Bret < bret.jordan@BLUECOAT.COM > wrote:



    Really good points Jason....  It is amazing how things like this bubble up as you start writing code.  I can now see how the ID and IDREF elements will break down rapidly and fall apart in to little pieces all over the floor.  Maybe the ID and IDREF thing needs
    to happen in a WorkBench tool that is listening on a TAXII channel.... ???  


    We just need to figure out how devices can emit things they see in STIX format based on a rule or policy.  














    Thanks,


    Bret











    Bret Jordan CISSP

    Director of Security Architecture and Standards Office of the CTO

    Blue Coat Systems

    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." 











    On Oct 30, 2015, at 10:51, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:



    So here is my question.


    " Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel.
    "

    How is that firewall going to generate and persist that observable ID to be re-referenced by the "light bulb sighting"? Because if he sees the same "something bad" 1 minute, hour, or day later, he should be sending the same observable ID - otherwise, the sightings
    numbers would all be reset every time he sees it.

    IE - the problem I describe extends beyond sightings, it also extends to observables and even indicators. Most producers of this information won't have the ways and means to build a giant database (of ie. all of the IP addresses they have ever seen) so that
    they know they will re-use the same ID if they want to re-emit an observable. As such if they want an ID that can be re-referenceable, they will have to generate an ID based on the current data, since the current data is all they have to go on.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> "Jordan, Bret" ---2015/10/30 12:36:36 PM---Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me expla

    From: "Jordan, Bret" < bret.jordan@bluecoat.com >
    To: Jason Keirstead/CanEast/IBM@IBMCA
    Cc: Terry MacDonald < terry@soltra.com >, Mark Davidson < mdavidson@mitre.org >, "Sean D. Barnum"
    < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >,
    "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Date: 2015/10/30 12:36 PM
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >




    Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me explain how I see the workflow going....


    Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. All of the end point devices (clients, phones, printers, ip enabled light bulbs) can see that indicator and respond with a sighting
    if the so desire.

    The sighting will have an IDREF or similar back to the objects it is referencing. Now the original client or a message handler running on the TAXII server (if the TAXII server is a broker + query repo) could pick up and aggregate all
    of the sightings coming back for that original observable and either store it or do something with it. In the TAXII server case (broker + repo) it might store the data in a database or bubble it up to an analyst for review before sending it out a different
    channel group.



    Thanks,

    Bret



    Bret Jordan CISSP
    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."



    On Oct 30, 2015, at 06:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:
    I know historically I have been pushing for an RFC-Compliant UUID as mandatory component of this - now i am going to backtrack on my previous argument :)

    I actually think that having a UUID be mandatory is not workable, and here is why: For many (most?) products looking to produce observable and sightings, there is no system-wide "ID" in their product that could be used to represent something like an observable.
    Similarly, STIX producers like embedded devices and endpoints, do not have the resources or processing capacity to start storing these relationships. As such, said producers have two options for generating sightings:




    a) Have a randomly-generated UUID (which is of no use to anyone in the end because it will remove all traceability and create rampant data duplication)

    b) Have an algorithmically derived ID based on the data (IE, any time I issue an observable for Equals 1.2.3.4, the same ID will be derived)


    (b) Is really the only workable ID mechanism for most products.

    I have recently started to run into this in practice in my own product work, so I know it is a real problem that is going to hit a lot of people if we start mandating IDs and UUIDs.


    Here is an assertion - why is ID even a mandatory field for a sighting? I am not sure why it is useful. If a STIX repository needs an ID for an internal record, it can generate its own in any way it wants. I am not sure why a producer needs to specify an ID.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> Terry MacDonald ---2015/10/29 06:51:35 PM---Mark, That should change with the top-level relationship object. It will be quite possible to send j

    From: Terry MacDonald < terry@soltra.com >
    To: "Davidson II, Mark S" < mdavidson@mitre.org >, "Jordan, Bret" < bret.jordan@bluecoat.com >,
    "Barnum, Sean D." < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >,
    "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org "
    < cti-stix@lists.oasis-open.org >
    Date: 2015/10/29 06:51 PM
    Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >





    Mark,

    That should change with the top-level relationship object. It will be quite possible to send just a relationship object in a package. This will mean that the consumer will need the ability to contact the original producer of the reference STIX data object to
    ask if they are allowed the full object rather than just the reference to it. Having the ability to find the TAXII server from just the STIX object ID is critical to allow this to happen.

    This functionality also allows more secretive providers to ‘hide’ their data, such that consumers can understand that relationships exist, but that only a small subset of approved consumers will have access to the actual STIX object data. It gives the ability
    to hide stuff.

    Cheers

    Terry MacDonald
    Senior STIX Subject Matter Expert
    SOLTRA An FS-ISAC and DTCC Company
    +61 (407) 203 206 terry@soltra.com



    From: Davidson II, Mark S [ mailto:mdavidson@mitre.org ]

    Sent: Friday, 30 October 2015 5:05 AM
    To: Jordan, Bret < bret.jordan@bluecoat.com >;
    Barnum, Sean D. < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >;
    Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >;
    Wunder, John A. < jwunder@mitre.org >;
    cti-stix@lists.oasis-open.org
    Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    If want the ability to dereference arbitrary STIX IDs (for use in accessing some kind of repository, let’s say), then I think requiring a rule whereby STIX IDs can be turned into a URL could be a good requirement (Note: URLs as IDs would satisfy this requirement).
    While there is a concept for idref today, I personally haven’t seen an implementation that dereferences STIX IDs outside of the document containing the idref.

    Thank you.
    -Mark

    PS, a notional example: <stix:Indicator idref=” https://example.org/stix121/indicators/123 ”/>




    From:
    cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ]
    On Behalf Of Jordan, Bret
    Sent: Thursday, October 29, 2015 1:03 PM
    To: Barnum, Sean D. < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >;
    Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >;
    Wunder, John A. < jwunder@mitre.org >;
    cti-stix@lists.oasis-open.org
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Let's just make sure we do not build an ID system that is so vast that it can enumerate every atom in the known universe.


    Bret

    Sent from my Commodore 64





    STIX SC Co-chair










    [attachment "signature.asc" deleted by Jason Keirstead/CanEast/IBM]






















  • 5.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 17:43
    So then the question becomes - if the consumers are not using the IDs, then why are they required...
    " That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. " I am against a mandatory 32 or 64 or whatever bytes in every sighting message if usually the bytes don't have any meaning behind them. And to again re-iterate - this problem is beyond sightings... it certainly exists for many classes of observables, and sometimes even indicators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown "Wunder, John A." ---2015/10/30 02:36:27 PM---Do you think tools will be doing correlation based on ID or doing correlation based on the contents From: "Wunder, John A." <jwunder@mitre.org> To: "Jordan, Bret" <bret.jordan@BLUECOAT.COM> Cc: Jason Keirstead/CanEast/IBM@IBMCA, Terry MacDonald <terry@soltra.com>, "Davidson II, Mark S" <mdavidson@mitre.org>, "Barnum, Sean D." <sbarnum@mitre.org>, Jerome Athias <athiasjerome@gmail.com>, "Taylor, Marlon" <Marlon.Taylor@hq.dhs.gov>, "cti-stix@lists.oasis-open.org" <cti-stix@lists.oasis-open.org> Date: 2015/10/30 02:36 PM Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: <cti-stix@lists.oasis-open.org> Do you think tools will be doing correlation based on ID or doing correlation based on the contents of an observable? As an example, imagine you have a sighting for an e-mail: - Subject: PLS OPEN ME KTHXBYE - From: defnotaspammer@example.com - Attachment: (some hash) Then you have this other sighting: - Subject: PLS OPEN ME KTHXBYE - From: defnotaspammer@example.com - Attachment: (some other hash) Then this one: - Subject: PLS OPEN ME KTHXBYE - From: defnotaspammer@example.com Which of those should match? I feel like we’re talking about this as if sightings are either the same or different when in reality there will mostly likely be degrees of similarity (0-100). So my conclusion is that IDs, even generated based on the content, are probably not all that useful for matching sightings. That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. John
    On Oct 30, 2015, at 1:24 PM, Jordan, Bret < bret.jordan@BLUECOAT.COM > wrote: Really good points Jason.... It is amazing how things like this bubble up as you start writing code. I can now see how the ID and IDREF elements will break down rapidly and fall apart in to little pieces all over the floor. Maybe the ID and IDREF thing needs to happen in a WorkBench tool that is listening on a TAXII channel.... ??? We just need to figure out how devices can emit things they see in STIX format based on a rule or policy. Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."
    On Oct 30, 2015, at 10:51, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:
    So here is my question. " Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. " How is that firewall going to generate and persist that observable ID to be re-referenced by the "light bulb sighting"? Because if he sees the same "something bad" 1 minute, hour, or day later, he should be sending the same observable ID - otherwise, the sightings numbers would all be reset every time he sees it. IE - the problem I describe extends beyond sightings, it also extends to observables and even indicators. Most producers of this information won't have the ways and means to build a giant database (of ie. all of the IP addresses they have ever seen) so that they know they will re-use the same ID if they want to re-emit an observable. As such if they want an ID that can be re-referenceable, they will have to generate an ID based on the current data, since the current data is all they have to go on. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> "Jordan, Bret" ---2015/10/30 12:36:36 PM---Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me expla From: "Jordan, Bret" < bret.jordan@bluecoat.com > To: Jason Keirstead/CanEast/IBM@IBMCA Cc: Terry MacDonald < terry@soltra.com >, Mark Davidson < mdavidson@mitre.org >, "Sean D. Barnum" < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Date: 2015/10/30 12:36 PM Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me explain how I see the workflow going.... Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. All of the end point devices (clients, phones, printers, ip enabled light bulbs) can see that indicator and respond with a sighting if the so desire. The sighting will have an IDREF or similar back to the objects it is referencing. Now the original client or a message handler running on the TAXII server (if the TAXII server is a broker + query repo) could pick up and aggregate all of the sightings coming back for that original observable and either store it or do something with it. In the TAXII server case (broker + repo) it might store the data in a database or bubble it up to an analyst for review before sending it out a different channel group. Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." On Oct 30, 2015, at 06:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I know historically I have been pushing for an RFC-Compliant UUID as mandatory component of this - now i am going to backtrack on my previous argument :) I actually think that having a UUID be mandatory is not workable, and here is why: For many (most?) products looking to produce observable and sightings, there is no system-wide "ID" in their product that could be used to represent something like an observable. Similarly, STIX producers like embedded devices and endpoints, do not have the resources or processing capacity to start storing these relationships. As such, said producers have two options for generating sightings: a) Have a randomly-generated UUID (which is of no use to anyone in the end because it will remove all traceability and create rampant data duplication) b) Have an algorithmically derived ID based on the data (IE, any time I issue an observable for Equals 1.2.3.4, the same ID will be derived) (b) Is really the only workable ID mechanism for most products. I have recently started to run into this in practice in my own product work, so I know it is a real problem that is going to hit a lot of people if we start mandating IDs and UUIDs. Here is an assertion - why is ID even a mandatory field for a sighting? I am not sure why it is useful. If a STIX repository needs an ID for an internal record, it can generate its own in any way it wants. I am not sure why a producer needs to specify an ID. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Terry MacDonald ---2015/10/29 06:51:35 PM---Mark, That should change with the top-level relationship object. It will be quite possible to send j From: Terry MacDonald < terry@soltra.com > To: "Davidson II, Mark S" < mdavidson@mitre.org >, "Jordan, Bret" < bret.jordan@bluecoat.com >, "Barnum, Sean D." < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Date: 2015/10/29 06:51 PM Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Mark, That should change with the top-level relationship object. It will be quite possible to send just a relationship object in a package. This will mean that the consumer will need the ability to contact the original producer of the reference STIX data object to ask if they are allowed the full object rather than just the reference to it. Having the ability to find the TAXII server from just the STIX object ID is critical to allow this to happen. This functionality also allows more secretive providers to ‘hide’ their data, such that consumers can understand that relationships exist, but that only a small subset of approved consumers will have access to the actual STIX object data. It gives the ability to hide stuff. Cheers Terry MacDonald Senior STIX Subject Matter Expert SOLTRA An FS-ISAC and DTCC Company +61 (407) 203 206 terry@soltra.com From: Davidson II, Mark S [ mailto:mdavidson@mitre.org ] Sent: Friday, 30 October 2015 5:05 AM To: Jordan, Bret < bret.jordan@bluecoat.com >; Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >; cti-stix@lists.oasis-open.org Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 If want the ability to dereference arbitrary STIX IDs (for use in accessing some kind of repository, let’s say), then I think requiring a rule whereby STIX IDs can be turned into a URL could be a good requirement (Note: URLs as IDs would satisfy this requirement). While there is a concept for idref today, I personally haven’t seen an implementation that dereferences STIX IDs outside of the document containing the idref. Thank you. -Mark PS, a notional example: <stix:Indicator idref=” https://example.org/stix121/indicators/123 ”/> From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Jordan, Bret Sent: Thursday, October 29, 2015 1:03 PM To: Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Let's just make sure we do not build an ID system that is so vast that it can enumerate every atom in the known universe. Bret Sent from my Commodore 64 STIX SC Co-chair [attachment "signature.asc" deleted by Jason Keirstead/CanEast/IBM]




  • 6.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 17:51



    I know we hate optionality, but they could be optional. It kind of gets to Jon Baker’s earlier point that organizational sightings have a different use case (and therefore different requirements) than internal tool-based sightings and the same field set may
    not solve both problems.


    John



    On Oct 30, 2015, at 1:42 PM, Jason Keirstead < Jason.Keirstead@CA.IBM.COM > wrote:



    So then the question becomes - if the consumers are not using the IDs, then why are they required...


    " That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions
    of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. "

    I am against a mandatory 32 or 64 or whatever bytes in every sighting message if usually the bytes don't have any meaning behind them.


    And to again re-iterate - this problem is beyond sightings... it certainly exists for many classes of observables, and sometimes even indicators.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> "Wunder, John A." ---2015/10/30 02:36:27 PM---Do you think tools will be doing correlation based on ID or doing correlation based on the contents

    From: "Wunder, John A." < jwunder@mitre.org >
    To: "Jordan, Bret" < bret.jordan@BLUECOAT.COM >
    Cc: Jason Keirstead/CanEast/IBM@IBMCA, Terry MacDonald < terry@soltra.com >, "Davidson II, Mark S" < mdavidson@mitre.org >,
    "Barnum, Sean D." < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >,
    " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Date: 2015/10/30 02:36 PM
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >




    Do you think tools will be doing correlation based on ID or doing correlation based on the contents of an observable?


    As an example, imagine you have a sighting for an e-mail:

    - Subject: PLS OPEN ME KTHXBYE
    - From: defnotaspammer@example.com
    - Attachment: (some hash)

    Then you have this other sighting:

    - Subject: PLS OPEN ME KTHXBYE
    - From: defnotaspammer@example.com
    - Attachment: (some other hash)

    Then this one:

    - Subject: PLS OPEN ME KTHXBYE
    - From: defnotaspammer@example.com

    Which of those should match? I feel like we’re talking about this as if sightings are either the same or different when in reality there will mostly likely be degrees of similarity (0-100). So my conclusion is that IDs, even generated
    based on the content, are probably not all that useful for matching sightings.

    That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions
    of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it.

    John


    On Oct 30, 2015, at 1:24 PM, Jordan, Bret < bret.jordan@BLUECOAT.COM > wrote:

    Really good points Jason.... It is amazing how things like this bubble up as you start writing code. I can now see how the ID and IDREF elements will break down rapidly and fall apart in to little pieces all over the floor. Maybe the
    ID and IDREF thing needs to happen in a WorkBench tool that is listening on a TAXII channel.... ???


    We just need to figure out how devices can emit things they see in STIX format based on a rule or policy.



    Thanks,

    Bret



    Bret Jordan CISSP

    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."



    On Oct 30, 2015, at 10:51, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:
    So here is my question.


    " Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel.
    "


    How is that firewall going to generate and persist that observable ID to be re-referenced by the "light bulb sighting"? Because if he sees the same "something bad" 1 minute, hour, or day later, he should be sending the same observable ID - otherwise, the sightings
    numbers would all be reset every time he sees it.

    IE - the problem I describe extends beyond sightings, it also extends to observables and even indicators. Most producers of this information won't have the ways and means to build a giant database (of ie. all of the IP addresses they have ever seen) so that
    they know they will re-use the same ID if they want to re-emit an observable. As such if they want an ID that can be re-referenceable, they will have to generate an ID based on the current data, since the current data is all they have to go on.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> "Jordan, Bret" ---2015/10/30 12:36:36 PM---Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me expla

    From: "Jordan, Bret" < bret.jordan@bluecoat.com >
    To: Jason Keirstead/CanEast/IBM@IBMCA
    Cc: Terry MacDonald < terry@soltra.com >, Mark Davidson < mdavidson@mitre.org >,
    "Sean D. Barnum" < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >,
    "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, "Wunder, John A." < jwunder@mitre.org >,
    " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Date: 2015/10/30 12:36 PM
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >





    Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me explain how I see the workflow going....


    Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. All of the end point devices (clients, phones, printers, ip enabled light bulbs) can see that indicator and respond with a sighting if the so desire.

    The sighting will have an IDREF or similar back to the objects it is referencing. Now the original client or a message handler running on the TAXII server (if the TAXII server is a broker + query repo) could pick up and aggregate all of the sightings coming
    back for that original observable and either store it or do something with it. In the TAXII server case (broker + repo) it might store the data in a database or bubble it up to an analyst for review before sending it out a different channel group.




    Thanks,

    Bret



    Bret Jordan CISSP
    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."





    On Oct 30, 2015, at 06:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:
    I know historically I have been pushing for an RFC-Compliant UUID as mandatory component of this - now i am going to backtrack on my previous argument :)

    I actually think that having a UUID be mandatory is not workable, and here is why: For many (most?) products looking to produce observable and sightings, there is no system-wide "ID" in their product that could be used to represent something like an observable.
    Similarly, STIX producers like embedded devices and endpoints, do not have the resources or processing capacity to start storing these relationships. As such, said producers have two options for generating sightings:






    a) Have a randomly-generated UUID (which is of no use to anyone in the end because it will remove all traceability and create rampant data duplication)

    b) Have an algorithmically derived ID based on the data (IE, any time I issue an observable for Equals 1.2.3.4, the same ID will be derived)




    (b) Is really the only workable ID mechanism for most products.

    I have recently started to run into this in practice in my own product work, so I know it is a real problem that is going to hit a lot of people if we start mandating IDs and UUIDs.


    Here is an assertion - why is ID even a mandatory field for a sighting? I am not sure why it is useful. If a STIX repository needs an ID for an internal record, it can generate its own in any way it wants. I am not sure why a producer needs to specify an ID.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> Terry MacDonald ---2015/10/29 06:51:35 PM---Mark, That should change with the top-level relationship object. It will be quite possible to send j

    From: Terry MacDonald < terry@soltra.com >
    To: "Davidson II, Mark S" < mdavidson@mitre.org >, "Jordan, Bret" < bret.jordan@bluecoat.com >,
    "Barnum, Sean D." < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >,
    "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org "
    < cti-stix@lists.oasis-open.org >
    Date: 2015/10/29 06:51 PM
    Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >





    Mark,

    That should change with the top-level relationship object. It will be quite possible to send just a relationship object in a package. This will mean that the consumer will need the ability to contact the original producer of the reference STIX data object to
    ask if they are allowed the full object rather than just the reference to it. Having the ability to find the TAXII server from just the STIX object ID is critical to allow this to happen.

    This functionality also allows more secretive providers to ‘hide’ their data, such that consumers can understand that relationships exist, but that only a small subset of approved consumers will have access to the actual STIX object data. It gives the ability
    to hide stuff.

    Cheers

    Terry MacDonald
    Senior STIX Subject Matter Expert
    SOLTRA An FS-ISAC and DTCC Company
    +61 (407) 203 206 terry@soltra.com



    From: Davidson II, Mark S [ mailto:mdavidson@mitre.org ]

    Sent: Friday, 30 October 2015 5:05 AM
    To: Jordan, Bret < bret.jordan@bluecoat.com >;
    Barnum, Sean D. < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >;
    Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >;
    Wunder, John A. < jwunder@mitre.org >;
    cti-stix@lists.oasis-open.org
    Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    If want the ability to dereference arbitrary STIX IDs (for use in accessing some kind of repository, let’s say), then I think requiring a rule whereby STIX IDs can be turned into a URL could be a good requirement (Note: URLs as IDs would satisfy this requirement).
    While there is a concept for idref today, I personally haven’t seen an implementation that dereferences STIX IDs outside of the document containing the idref.

    Thank you.
    -Mark

    PS, a notional example: <stix:Indicator idref=” https://example.org/stix121/indicators/123 ”/>









    From:
    cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ]
    On Behalf Of Jordan, Bret
    Sent: Thursday, October 29, 2015 1:03 PM
    To: Barnum, Sean D. < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >;
    Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >;
    Wunder, John A. < jwunder@mitre.org >;
    cti-stix@lists.oasis-open.org
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Let's just make sure we do not build an ID system that is so vast that it can enumerate every atom in the known universe.


    Bret

    Sent from my Commodore 64









    STIX SC Co-chair



















    [attachment "signature.asc" deleted by Jason Keirstead/CanEast/IBM]




















  • 7.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 17:56
    I think on the surface it may seem like they are different and the Org to Org sharing will be easier.  But that is only the case when you have a very finite number of people contributing to the eco-system.  The problem becomes more complex when every SOC in every major enterprise and mom-n-pop shop starts emitting an Indicator+CybOX+MAEC for the same exact piece of Malware. You could easily have 10,000 IDs for exactly the same thing. Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Oct 30, 2015, at 11:50, Wunder, John A. < jwunder@mitre.org > wrote: I know we hate optionality, but they could be optional. It kind of gets to Jon Baker’s earlier point that organizational sightings have a different use case (and therefore different requirements) than internal tool-based sightings and the same field set may not solve both problems. John On Oct 30, 2015, at 1:42 PM, Jason Keirstead < Jason.Keirstead@CA.IBM.COM > wrote: So then the question becomes - if the consumers are not using the IDs, then why are they required... That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. I am against a mandatory 32 or 64 or whatever bytes in every sighting message if usually the bytes don't have any meaning behind them. And to again re-iterate - this problem is beyond sightings... it certainly exists for many classes of observables, and sometimes even indicators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Wunder, John A. ---2015/10/30 02:36:27 PM---Do you think tools will be doing correlation based on ID or doing correlation based on the contents From: Wunder, John A. < jwunder@mitre.org > To: Jordan, Bret < bret.jordan@BLUECOAT.COM > Cc: Jason Keirstead/CanEast/IBM@IBMCA, Terry MacDonald < terry@soltra.com >, Davidson II, Mark S < mdavidson@mitre.org >, Barnum, Sean D. < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >, Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Date: 2015/10/30 02:36 PM Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Do you think tools will be doing correlation based on ID or doing correlation based on the contents of an observable? As an example, imagine you have a sighting for an e-mail: - Subject: PLS OPEN ME KTHXBYE - From: defnotaspammer@example.com - Attachment: (some hash) Then you have this other sighting: - Subject: PLS OPEN ME KTHXBYE - From: defnotaspammer@example.com - Attachment: (some other hash) Then this one: - Subject: PLS OPEN ME KTHXBYE - From: defnotaspammer@example.com Which of those should match? I feel like we’re talking about this as if sightings are either the same or different when in reality there will mostly likely be degrees of similarity (0-100). So my conclusion is that IDs, even generated based on the content, are probably not all that useful for matching sightings. That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. John On Oct 30, 2015, at 1:24 PM, Jordan, Bret < bret.jordan@BLUECOAT.COM > wrote: Really good points Jason.... It is amazing how things like this bubble up as you start writing code. I can now see how the ID and IDREF elements will break down rapidly and fall apart in to little pieces all over the floor. Maybe the ID and IDREF thing needs to happen in a WorkBench tool that is listening on a TAXII channel.... ??? We just need to figure out how devices can emit things they see in STIX format based on a rule or policy. Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg. On Oct 30, 2015, at 10:51, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: So here is my question. Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. How is that firewall going to generate and persist that observable ID to be re-referenced by the light bulb sighting ? Because if he sees the same something bad 1 minute, hour, or day later, he should be sending the same observable ID - otherwise, the sightings numbers would all be reset every time he sees it. IE - the problem I describe extends beyond sightings, it also extends to observables and even indicators. Most producers of this information won't have the ways and means to build a giant database (of ie. all of the IP addresses they have ever seen) so that they know they will re-use the same ID if they want to re-emit an observable. As such if they want an ID that can be re-referenceable, they will have to generate an ID based on the current data, since the current data is all they have to go on. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Jordan, Bret ---2015/10/30 12:36:36 PM---Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me expla From: Jordan, Bret < bret.jordan@bluecoat.com > To: Jason Keirstead/CanEast/IBM@IBMCA Cc: Terry MacDonald < terry@soltra.com >, Mark Davidson < mdavidson@mitre.org >, Sean D. Barnum < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >, Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >, Wunder, John A. < jwunder@mitre.org >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Date: 2015/10/30 12:36 PM Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me explain how I see the workflow going.... Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. All of the end point devices (clients, phones, printers, ip enabled light bulbs) can see that indicator and respond with a sighting if the so desire. The sighting will have an IDREF or similar back to the objects it is referencing. Now the original client or a message handler running on the TAXII server (if the TAXII server is a broker + query repo) could pick up and aggregate all of the sightings coming back for that original observable and either store it or do something with it. In the TAXII server case (broker + repo) it might store the data in a database or bubble it up to an analyst for review before sending it out a different channel group. Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg. On Oct 30, 2015, at 06:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I know historically I have been pushing for an RFC-Compliant UUID as mandatory component of this - now i am going to backtrack on my previous argument :) I actually think that having a UUID be mandatory is not workable, and here is why: For many (most?) products looking to produce observable and sightings, there is no system-wide ID in their product that could be used to represent something like an observable. Similarly, STIX producers like embedded devices and endpoints, do not have the resources or processing capacity to start storing these relationships. As such, said producers have two options for generating sightings: a) Have a randomly-generated UUID (which is of no use to anyone in the end because it will remove all traceability and create rampant data duplication) b) Have an algorithmically derived ID based on the data (IE, any time I issue an observable for Equals 1.2.3.4, the same ID will be derived) (b) Is really the only workable ID mechanism for most products. I have recently started to run into this in practice in my own product work, so I know it is a real problem that is going to hit a lot of people if we start mandating IDs and UUIDs. Here is an assertion - why is ID even a mandatory field for a sighting? I am not sure why it is useful. If a STIX repository needs an ID for an internal record, it can generate its own in any way it wants. I am not sure why a producer needs to specify an ID. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Terry MacDonald ---2015/10/29 06:51:35 PM---Mark, That should change with the top-level relationship object. It will be quite possible to send j From: Terry MacDonald < terry@soltra.com > To: Davidson II, Mark S < mdavidson@mitre.org >, Jordan, Bret < bret.jordan@bluecoat.com >, Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >, Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >, Wunder, John A. < jwunder@mitre.org >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Date: 2015/10/29 06:51 PM Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Mark, That should change with the top-level relationship object. It will be quite possible to send just a relationship object in a package. This will mean that the consumer will need the ability to contact the original producer of the reference STIX data object to ask if they are allowed the full object rather than just the reference to it. Having the ability to find the TAXII server from just the STIX object ID is critical to allow this to happen. This functionality also allows more secretive providers to ‘hide’ their data, such that consumers can understand that relationships exist, but that only a small subset of approved consumers will have access to the actual STIX object data. It gives the ability to hide stuff. Cheers Terry MacDonald Senior STIX Subject Matter Expert SOLTRA An FS-ISAC and DTCC Company +61 (407) 203 206 terry@soltra.com From: Davidson II, Mark S [ mailto:mdavidson@mitre.org ] Sent: Friday, 30 October 2015 5:05 AM To: Jordan, Bret < bret.jordan@bluecoat.com >; Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >; cti-stix@lists.oasis-open.org Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 If want the ability to dereference arbitrary STIX IDs (for use in accessing some kind of repository, let’s say), then I think requiring a rule whereby STIX IDs can be turned into a URL could be a good requirement (Note: URLs as IDs would satisfy this requirement). While there is a concept for idref today, I personally haven’t seen an implementation that dereferences STIX IDs outside of the document containing the idref. Thank you. -Mark PS, a notional example: <stix:Indicator idref=” https://example.org/stix121/indicators/123 ”/> From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Jordan, Bret Sent: Thursday, October 29, 2015 1:03 PM To: Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Let's just make sure we do not build an ID system that is so vast that it can enumerate every atom in the known universe. Bret Sent from my Commodore 64 STIX SC Co-chair [attachment signature.asc deleted by Jason Keirstead/CanEast/IBM] Attachment: signature.asc Description: Message signed with OpenPGP using GPGMail


  • 8.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 18:10



    But in those cases wouldn’t the consumers want some way to go back to the producers and ask for more info? Or, when they do, do you think they would just go back with the entire sighting rather than an ID?


    It just seems like we have this standard ID mechanism on most things and we should have a very good reason to not follow that pattern here.





    On Oct 30, 2015, at 1:56 PM, Jordan, Bret < bret.jordan@BLUECOAT.COM > wrote:



    I think on the surface it may seem like they are different and the Org to Org sharing will be easier.  But that is only the case when you have a very finite number of people contributing to the eco-system.  The problem becomes more complex when every SOC in
    every major enterprise and mom-n-pop shop starts emitting an Indicator+CybOX+MAEC for the same exact piece of Malware. You could easily have 10,000 IDs for exactly the same thing.











    Thanks,


    Bret











    Bret Jordan CISSP

    Director of Security Architecture and Standards Office of the CTO

    Blue Coat Systems

    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." 











    On Oct 30, 2015, at 11:50, Wunder, John A. < jwunder@mitre.org > wrote:



    I know we hate optionality, but they could be optional. It kind of gets to Jon Baker’s earlier point that organizational sightings have a different use case (and therefore different requirements) than internal tool-based sightings and the same field set may
    not solve both problems.


    John



    On Oct 30, 2015, at 1:42 PM, Jason Keirstead < Jason.Keirstead@CA.IBM.COM > wrote:



    So then the question becomes - if the consumers are not using the IDs, then why are they required...


    " That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions
    of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. "

    I am against a mandatory 32 or 64 or whatever bytes in every sighting message if usually the bytes don't have any meaning behind them.


    And to again re-iterate - this problem is beyond sightings... it certainly exists for many classes of observables, and sometimes even indicators.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> "Wunder, John A." ---2015/10/30 02:36:27 PM---Do you think tools will be doing correlation based on ID or doing correlation based on the
    contents

    From: "Wunder, John A." < jwunder@mitre.org >
    To: "Jordan, Bret" < bret.jordan@BLUECOAT.COM >
    Cc: Jason Keirstead/CanEast/IBM@IBMCA, Terry MacDonald < terry@soltra.com >, "Davidson II, Mark S" < mdavidson@mitre.org >,
    "Barnum, Sean D." < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >,
    " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Date: 2015/10/30 02:36 PM
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >




    Do you think tools will be doing correlation based on ID or doing correlation based on the contents of an observable?


    As an example, imagine you have a sighting for an e-mail:

    - Subject: PLS OPEN ME KTHXBYE
    - From: defnotaspammer@example.com
    - Attachment: (some hash)

    Then you have this other sighting:

    - Subject: PLS OPEN ME KTHXBYE
    - From: defnotaspammer@example.com
    - Attachment: (some other hash)

    Then this one:

    - Subject: PLS OPEN ME KTHXBYE
    - From: defnotaspammer@example.com

    Which of those should match? I feel like we’re talking about this as if sightings are either the same or different when in reality there will mostly likely be degrees of similarity (0-100). So my conclusion is that IDs, even generated
    based on the content, are probably not all that useful for matching sightings.

    That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions
    of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it.

    John


    On Oct 30, 2015, at 1:24 PM, Jordan, Bret < bret.jordan@BLUECOAT.COM > wrote:

    Really good points Jason.... It is amazing how things like this bubble up as you start writing code. I can now see how the ID and IDREF elements will break down rapidly and fall apart in to little pieces all over the floor. Maybe the
    ID and IDREF thing needs to happen in a WorkBench tool that is listening on a TAXII channel.... ???


    We just need to figure out how devices can emit things they see in STIX format based on a rule or policy.



    Thanks,

    Bret



    Bret Jordan CISSP

    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."



    On Oct 30, 2015, at 10:51, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:
    So here is my question.


    " Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel.
    "


    How is that firewall going to generate and persist that observable ID to be re-referenced by the "light bulb sighting"? Because if he sees the same "something bad" 1 minute, hour, or day later, he should be sending the same observable ID - otherwise, the sightings
    numbers would all be reset every time he sees it.

    IE - the problem I describe extends beyond sightings, it also extends to observables and even indicators. Most producers of this information won't have the ways and means to build a giant database (of ie. all of the IP addresses they have ever seen) so that
    they know they will re-use the same ID if they want to re-emit an observable. As such if they want an ID that can be re-referenceable, they will have to generate an ID based on the current data, since the current data is all they have to go on.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> "Jordan, Bret" ---2015/10/30 12:36:36 PM---Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me expla

    From: "Jordan, Bret" < bret.jordan@bluecoat.com >
    To: Jason Keirstead/CanEast/IBM@IBMCA
    Cc: Terry MacDonald < terry@soltra.com >, Mark Davidson < mdavidson@mitre.org >,
    "Sean D. Barnum" < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >,
    "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, "Wunder, John A." < jwunder@mitre.org >,
    " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Date: 2015/10/30 12:36 PM
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >





    Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me explain how I see the workflow going....


    Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. All of the end point devices (clients, phones, printers, ip enabled light bulbs) can see that indicator and respond with a sighting if the so desire.

    The sighting will have an IDREF or similar back to the objects it is referencing. Now the original client or a message handler running on the TAXII server (if the TAXII server is a broker + query repo) could pick up and aggregate all of the sightings coming
    back for that original observable and either store it or do something with it. In the TAXII server case (broker + repo) it might store the data in a database or bubble it up to an analyst for review before sending it out a different channel group.




    Thanks,

    Bret



    Bret Jordan CISSP
    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."





    On Oct 30, 2015, at 06:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:
    I know historically I have been pushing for an RFC-Compliant UUID as mandatory component of this - now i am going to backtrack on my previous argument :)

    I actually think that having a UUID be mandatory is not workable, and here is why: For many (most?) products looking to produce observable and sightings, there is no system-wide "ID" in their product that could be used to represent something like an observable.
    Similarly, STIX producers like embedded devices and endpoints, do not have the resources or processing capacity to start storing these relationships. As such, said producers have two options for generating sightings:






    a) Have a randomly-generated UUID (which is of no use to anyone in the end because it will remove all traceability and create rampant data duplication)

    b) Have an algorithmically derived ID based on the data (IE, any time I issue an observable for Equals 1.2.3.4, the same ID will be derived)




    (b) Is really the only workable ID mechanism for most products.

    I have recently started to run into this in practice in my own product work, so I know it is a real problem that is going to hit a lot of people if we start mandating IDs and UUIDs.


    Here is an assertion - why is ID even a mandatory field for a sighting? I am not sure why it is useful. If a STIX repository needs an ID for an internal record, it can generate its own in any way it wants. I am not sure why a producer needs to specify an ID.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> Terry MacDonald ---2015/10/29 06:51:35 PM---Mark, That should change with the top-level relationship object. It will be quite possible to send j

    From: Terry MacDonald < terry@soltra.com >
    To: "Davidson II, Mark S" < mdavidson@mitre.org >, "Jordan, Bret" < bret.jordan@bluecoat.com >,
    "Barnum, Sean D." < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >,
    "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org "
    < cti-stix@lists.oasis-open.org >
    Date: 2015/10/29 06:51 PM
    Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >





    Mark,

    That should change with the top-level relationship object. It will be quite possible to send just a relationship object in a package. This will mean that the consumer will need the ability to contact the original producer of the reference STIX data object to
    ask if they are allowed the full object rather than just the reference to it. Having the ability to find the TAXII server from just the STIX object ID is critical to allow this to happen.

    This functionality also allows more secretive providers to ‘hide’ their data, such that consumers can understand that relationships exist, but that only a small subset of approved consumers will have access to the actual STIX object data. It gives the ability
    to hide stuff.

    Cheers

    Terry MacDonald
    Senior STIX Subject Matter Expert
    SOLTRA An FS-ISAC and DTCC Company
    +61 (407) 203 206 terry@soltra.com



    From: Davidson II, Mark S [ mailto:mdavidson@mitre.org ]

    Sent: Friday, 30 October 2015 5:05 AM
    To: Jordan, Bret < bret.jordan@bluecoat.com >;
    Barnum, Sean D. < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >;
    Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >;
    Wunder, John A. < jwunder@mitre.org >;
    cti-stix@lists.oasis-open.org
    Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    If want the ability to dereference arbitrary STIX IDs (for use in accessing some kind of repository, let’s say), then I think requiring a rule whereby STIX IDs can be turned into a URL could be a good requirement (Note: URLs as IDs would satisfy this requirement).
    While there is a concept for idref today, I personally haven’t seen an implementation that dereferences STIX IDs outside of the document containing the idref.

    Thank you.
    -Mark

    PS, a notional example: <stix:Indicator idref=” https://example.org/stix121/indicators/123 ”/>









    From:
    cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ]
    On Behalf Of Jordan, Bret
    Sent: Thursday, October 29, 2015 1:03 PM
    To: Barnum, Sean D. < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >;
    Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >;
    Wunder, John A. < jwunder@mitre.org >;
    cti-stix@lists.oasis-open.org
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Let's just make sure we do not build an ID system that is so vast that it can enumerate every atom in the known universe.


    Bret

    Sent from my Commodore 64









    STIX SC Co-chair



















    [attachment "signature.asc" deleted by Jason Keirstead/CanEast/IBM]
































  • 9.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 18:15
    That is kind of the point - there is no way to go back to these automated systems and ask for more info - they don't have it... they have no systems of record to store it in. This will be true of all kinds of security devices: Firewall IPS NGFW App Sandbox Endpoint protection * * Most endpoints have a system of record of IOCs up on a management console somewhere, but not always All of these device classes could reasonably directly produce observables and sightings, but none of them have systems of record that can make use of IDs for querying. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown "Wunder, John A." ---2015/10/30 03:10:28 PM---But in those cases wouldn’t the consumers want some way to go back to the producers and ask for more From: "Wunder, John A." <jwunder@mitre.org> To: "cti-stix@lists.oasis-open.org" <cti-stix@lists.oasis-open.org> Date: 2015/10/30 03:10 PM Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: <cti-stix@lists.oasis-open.org> But in those cases wouldn’t the consumers want some way to go back to the producers and ask for more info? Or, when they do, do you think they would just go back with the entire sighting rather than an ID? It just seems like we have this standard ID mechanism on most things and we should have a very good reason to not follow that pattern here. On Oct 30, 2015, at 1:56 PM, Jordan, Bret < bret.jordan@BLUECOAT.COM > wrote: I think on the surface it may seem like they are different and the Org to Org sharing will be easier. But that is only the case when you have a very finite number of people contributing to the eco-system. The problem becomes more complex when every SOC in every major enterprise and mom-n-pop shop starts emitting an Indicator+CybOX+MAEC for the same exact piece of Malware. You could easily have 10,000 IDs for exactly the same thing. Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." On Oct 30, 2015, at 11:50, Wunder, John A. < jwunder@mitre.org > wrote: I know we hate optionality, but they could be optional. It kind of gets to Jon Baker’s earlier point that organizational sightings have a different use case (and therefore different requirements) than internal tool-based sightings and the same field set may not solve both problems. John On Oct 30, 2015, at 1:42 PM, Jason Keirstead < Jason.Keirstead@CA.IBM.COM > wrote: So then the question becomes - if the consumers are not using the IDs, then why are they required... " That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. " I am against a mandatory 32 or 64 or whatever bytes in every sighting message if usually the bytes don't have any meaning behind them. And to again re-iterate - this problem is beyond sightings... it certainly exists for many classes of observables, and sometimes even indicators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> "Wunder, John A." ---2015/10/30 02:36:27 PM---Do you think tools will be doing correlation based on ID or doing correlation based on the contents From: "Wunder, John A." < jwunder@mitre.org > To: "Jordan, Bret" < bret.jordan@BLUECOAT.COM > Cc: Jason Keirstead/CanEast/IBM@IBMCA, Terry MacDonald < terry@soltra.com >, "Davidson II, Mark S" < mdavidson@mitre.org >, "Barnum, Sean D." < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Date: 2015/10/30 02:36 PM Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Do you think tools will be doing correlation based on ID or doing correlation based on the contents of an observable? As an example, imagine you have a sighting for an e-mail: - Subject: PLS OPEN ME KTHXBYE - From: defnotaspammer@example.com - Attachment: (some hash) Then you have this other sighting: - Subject: PLS OPEN ME KTHXBYE - From: defnotaspammer@example.com - Attachment: (some other hash) Then this one: - Subject: PLS OPEN ME KTHXBYE - From: defnotaspammer@example.com Which of those should match? I feel like we’re talking about this as if sightings are either the same or different when in reality there will mostly likely be degrees of similarity (0-100). So my conclusion is that IDs, even generated based on the content, are probably not all that useful for matching sightings. That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. John On Oct 30, 2015, at 1:24 PM, Jordan, Bret < bret.jordan@BLUECOAT.COM > wrote: Really good points Jason.... It is amazing how things like this bubble up as you start writing code. I can now see how the ID and IDREF elements will break down rapidly and fall apart in to little pieces all over the floor. Maybe the ID and IDREF thing needs to happen in a WorkBench tool that is listening on a TAXII channel.... ??? We just need to figure out how devices can emit things they see in STIX format based on a rule or policy. Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." On Oct 30, 2015, at 10:51, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: So here is my question. " Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. " How is that firewall going to generate and persist that observable ID to be re-referenced by the "light bulb sighting"? Because if he sees the same "something bad" 1 minute, hour, or day later, he should be sending the same observable ID - otherwise, the sightings numbers would all be reset every time he sees it. IE - the problem I describe extends beyond sightings, it also extends to observables and even indicators. Most producers of this information won't have the ways and means to build a giant database (of ie. all of the IP addresses they have ever seen) so that they know they will re-use the same ID if they want to re-emit an observable. As such if they want an ID that can be re-referenceable, they will have to generate an ID based on the current data, since the current data is all they have to go on. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> "Jordan, Bret" ---2015/10/30 12:36:36 PM---Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me expla From: "Jordan, Bret" < bret.jordan@bluecoat.com > To: Jason Keirstead/CanEast/IBM@IBMCA Cc: Terry MacDonald < terry@soltra.com >, Mark Davidson < mdavidson@mitre.org >, "Sean D. Barnum" < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Date: 2015/10/30 12:36 PM Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me explain how I see the workflow going.... Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. All of the end point devices (clients, phones, printers, ip enabled light bulbs) can see that indicator and respond with a sighting if the so desire. The sighting will have an IDREF or similar back to the objects it is referencing. Now the original client or a message handler running on the TAXII server (if the TAXII server is a broker + query repo) could pick up and aggregate all of the sightings coming back for that original observable and either store it or do something with it. In the TAXII server case (broker + repo) it might store the data in a database or bubble it up to an analyst for review before sending it out a different channel group. Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." On Oct 30, 2015, at 06:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I know historically I have been pushing for an RFC-Compliant UUID as mandatory component of this - now i am going to backtrack on my previous argument :) I actually think that having a UUID be mandatory is not workable, and here is why: For many (most?) products looking to produce observable and sightings, there is no system-wide "ID" in their product that could be used to represent something like an observable. Similarly, STIX producers like embedded devices and endpoints, do not have the resources or processing capacity to start storing these relationships. As such, said producers have two options for generating sightings: a) Have a randomly-generated UUID (which is of no use to anyone in the end because it will remove all traceability and create rampant data duplication) b) Have an algorithmically derived ID based on the data (IE, any time I issue an observable for Equals 1.2.3.4, the same ID will be derived) (b) Is really the only workable ID mechanism for most products. I have recently started to run into this in practice in my own product work, so I know it is a real problem that is going to hit a lot of people if we start mandating IDs and UUIDs. Here is an assertion - why is ID even a mandatory field for a sighting? I am not sure why it is useful. If a STIX repository needs an ID for an internal record, it can generate its own in any way it wants. I am not sure why a producer needs to specify an ID. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Terry MacDonald ---2015/10/29 06:51:35 PM---Mark, That should change with the top-level relationship object. It will be quite possible to send j From: Terry MacDonald < terry@soltra.com > To: "Davidson II, Mark S" < mdavidson@mitre.org >, "Jordan, Bret" < bret.jordan@bluecoat.com >, "Barnum, Sean D." < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Date: 2015/10/29 06:51 PM Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Mark, That should change with the top-level relationship object. It will be quite possible to send just a relationship object in a package. This will mean that the consumer will need the ability to contact the original producer of the reference STIX data object to ask if they are allowed the full object rather than just the reference to it. Having the ability to find the TAXII server from just the STIX object ID is critical to allow this to happen. This functionality also allows more secretive providers to ‘hide’ their data, such that consumers can understand that relationships exist, but that only a small subset of approved consumers will have access to the actual STIX object data. It gives the ability to hide stuff. Cheers Terry MacDonald Senior STIX Subject Matter Expert SOLTRA An FS-ISAC and DTCC Company +61 (407) 203 206 terry@soltra.com From: Davidson II, Mark S [ mailto:mdavidson@mitre.org ] Sent: Friday, 30 October 2015 5:05 AM To: Jordan, Bret < bret.jordan@bluecoat.com >; Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >; cti-stix@lists.oasis-open.org Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 If want the ability to dereference arbitrary STIX IDs (for use in accessing some kind of repository, let’s say), then I think requiring a rule whereby STIX IDs can be turned into a URL could be a good requirement (Note: URLs as IDs would satisfy this requirement). While there is a concept for idref today, I personally haven’t seen an implementation that dereferences STIX IDs outside of the document containing the idref. Thank you. -Mark PS, a notional example: <stix:Indicator idref=” https://example.org/stix121/indicators/123 ”/> From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Jordan, Bret Sent: Thursday, October 29, 2015 1:03 PM To: Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Let's just make sure we do not build an ID system that is so vast that it can enumerate every atom in the known universe. Bret Sent from my Commodore 64 STIX SC Co-chair [attachment "signature.asc" deleted by Jason Keirstead/CanEast/IBM]


  • 10.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 18:19



    Sorry, I was talking about org-to-org here. I imagine in those cases it’ll be threat intel aggregation systems and will have a bit more ability to do tracking to support capabilities like this.


    I agree that you won’t have this use case directly on these tools.



    On Oct 30, 2015, at 2:14 PM, Jason Keirstead < Jason.Keirstead@CA.IBM.COM > wrote:



    That is kind of the point - there is no way to go back to these automated systems and ask for more info - they don't have it... they have no systems of record to store it in. This will be true of all kinds of security devices:


    Firewall
    IPS
    NGFW
    App Sandbox
    Endpoint protection *

    * Most endpoints have a system of record of IOCs up on a management console somewhere, but not always

    All of these device classes could reasonably directly produce observables and sightings, but none of them have systems of record that can make use of IDs for querying.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> "Wunder, John A." ---2015/10/30 03:10:28 PM---But in those cases wouldn’t the consumers want some way to go back to the producers and ask for more

    From: "Wunder, John A." < jwunder@mitre.org >
    To: " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Date: 2015/10/30 03:10 PM
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >




    But in those cases wouldn’t the consumers want some way to go back to the producers and ask for more info? Or, when they do, do you think they would just go back with the entire sighting rather than an ID?


    It just seems like we have this standard ID mechanism on most things and we should have a very good reason to not follow that pattern here.


    On Oct 30, 2015, at 1:56 PM, Jordan, Bret < bret.jordan@BLUECOAT.COM > wrote:

    I think on the surface it may seem like they are different and the Org to Org sharing will be easier. But that is only the case when you have a very finite number of people contributing to the eco-system. The problem becomes more complex
    when every SOC in every major enterprise and mom-n-pop shop starts emitting an Indicator+CybOX+MAEC for the same exact piece of Malware. You could easily have 10,000 IDs for exactly the same thing.


    Thanks,

    Bret



    Bret Jordan CISSP

    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."



    On Oct 30, 2015, at 11:50, Wunder, John A. < jwunder@mitre.org > wrote:

    I know we hate optionality, but they could be optional. It kind of gets to Jon Baker’s earlier point that organizational sightings have a different use case (and therefore different requirements) than internal tool-based sightings and
    the same field set may not solve both problems.

    John


    On Oct 30, 2015, at 1:42 PM, Jason Keirstead < Jason.Keirstead@CA.IBM.COM > wrote:
    So then the question becomes - if the consumers are not using the IDs, then why are they required...


    " That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support
    that (a firewall generating millions of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. "


    I am against a mandatory 32 or 64 or whatever bytes in every sighting message if usually the bytes don't have any meaning behind them.


    And to again re-iterate - this problem is beyond sightings... it certainly exists for many classes of observables, and sometimes even indicators.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> "Wunder, John A." ---2015/10/30 02:36:27 PM---Do you think tools will be doing correlation based on ID or doing correlation based on the contents

    From: "Wunder, John A." < jwunder@mitre.org >
    To: "Jordan, Bret" < bret.jordan@BLUECOAT.COM >
    Cc: Jason Keirstead/CanEast/IBM@IBMCA, Terry MacDonald < terry@soltra.com >, "Davidson II, Mark S" < mdavidson@mitre.org >,
    "Barnum, Sean D." < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >,
    "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, " cti-stix@lists.oasis-open.org "
    < cti-stix@lists.oasis-open.org >
    Date: 2015/10/30 02:36 PM
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >





    Do you think tools will be doing correlation based on ID or doing correlation based on the contents of an observable?


    As an example, imagine you have a sighting for an e-mail:

    - Subject: PLS OPEN ME KTHXBYE
    - From: defnotaspammer@example.com
    - Attachment: (some hash)

    Then you have this other sighting:

    - Subject: PLS OPEN ME KTHXBYE
    - From: defnotaspammer@example.com
    - Attachment: (some other hash)

    Then this one:

    - Subject: PLS OPEN ME KTHXBYE
    - From: defnotaspammer@example.com

    Which of those should match? I feel like we’re talking about this as if sightings are either the same or different when in reality there will mostly likely be degrees of similarity (0-100). So my conclusion is that IDs, even generated based on the content,
    are probably not all that useful for matching sightings.

    That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings won’t
    persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it.

    John




    On Oct 30, 2015, at 1:24 PM, Jordan, Bret < bret.jordan@BLUECOAT.COM > wrote:

    Really good points Jason.... It is amazing how things like this bubble up as you start writing code. I can now see how the ID and IDREF elements will break down rapidly and fall apart in to little pieces all over the floor. Maybe the ID and IDREF thing needs
    to happen in a WorkBench tool that is listening on a TAXII channel.... ???


    We just need to figure out how devices can emit things they see in STIX format based on a rule or policy.



    Thanks,

    Bret



    Bret Jordan CISSP
    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."





    On Oct 30, 2015, at 10:51, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:
    So here is my question.




    " Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel.
    "




    How is that firewall going to generate and persist that observable ID to be re-referenced by the "light bulb sighting"? Because if he sees the same "something bad" 1 minute, hour, or day later, he should be sending the same observable ID - otherwise, the sightings
    numbers would all be reset every time he sees it.

    IE - the problem I describe extends beyond sightings, it also extends to observables and even indicators. Most producers of this information won't have the ways and means to build a giant database (of ie. all of the IP addresses they have ever seen) so that
    they know they will re-use the same ID if they want to re-emit an observable. As such if they want an ID that can be re-referenceable, they will have to generate an ID based on the current data, since the current data is all they have to go on.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> "Jordan, Bret" ---2015/10/30 12:36:36 PM---Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me expla

    From: "Jordan, Bret" < bret.jordan@bluecoat.com >
    To: Jason Keirstead/CanEast/IBM@IBMCA
    Cc: Terry MacDonald < terry@soltra.com >, Mark Davidson < mdavidson@mitre.org >,
    "Sean D. Barnum" < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >,
    "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, "Wunder, John A." < jwunder@mitre.org >,
    " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Date: 2015/10/30 12:36 PM
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >





    Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me explain how I see the workflow going....


    Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. All of the end point devices (clients, phones, printers, ip enabled light bulbs) can see that indicator and respond with a sighting if the so desire.

    The sighting will have an IDREF or similar back to the objects it is referencing. Now the original client or a message handler running on the TAXII server (if the TAXII server is a broker + query repo) could pick up and aggregate all of the sightings coming
    back for that original observable and either store it or do something with it. In the TAXII server case (broker + repo) it might store the data in a database or bubble it up to an analyst for review before sending it out a different channel group.




    Thanks,

    Bret



    Bret Jordan CISSP
    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."









    On Oct 30, 2015, at 06:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:

    I know historically I have been pushing for an RFC-Compliant UUID as mandatory component of this - now i am going to backtrack on my previous argument :)

    I actually think that having a UUID be mandatory is not workable, and here is why: For many (most?) products looking to produce observable and sightings, there is no system-wide "ID" in their product that could be used to represent something like an observable.
    Similarly, STIX producers like embedded devices and endpoints, do not have the resources or processing capacity to start storing these relationships. As such, said producers have two options for generating sightings:










    a) Have a randomly-generated UUID (which is of no use to anyone in the end because it will remove all traceability and create rampant data duplication)

    b) Have an algorithmically derived ID based on the data (IE, any time I issue an observable for Equals 1.2.3.4, the same ID will be derived)








    (b) Is really the only workable ID mechanism for most products.

    I have recently started to run into this in practice in my own product work, so I know it is a real problem that is going to hit a lot of people if we start mandating IDs and UUIDs.


    Here is an assertion - why is ID even a mandatory field for a sighting? I am not sure why it is useful. If a STIX repository needs an ID for an internal record, it can generate its own in any way it wants. I am not sure why a producer needs to specify an ID.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> Terry MacDonald ---2015/10/29 06:51:35 PM---Mark, That should change with the top-level relationship object. It will be quite possible to send j

    From: Terry MacDonald < terry@soltra.com >
    To: "Davidson II, Mark S" < mdavidson@mitre.org >, "Jordan, Bret" < bret.jordan@bluecoat.com >,
    "Barnum, Sean D." < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >,
    "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org "
    < cti-stix@lists.oasis-open.org >
    Date: 2015/10/29 06:51 PM
    Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >





    Mark,

    That should change with the top-level relationship object. It will be quite possible to send just a relationship object in a package. This will mean that the consumer will need the ability to contact the original producer of the reference STIX data object to
    ask if they are allowed the full object rather than just the reference to it. Having the ability to find the TAXII server from just the STIX object ID is critical to allow this to happen.

    This functionality also allows more secretive providers to ‘hide’ their data, such that consumers can understand that relationships exist, but that only a small subset of approved consumers will have access to the actual STIX object data. It gives the ability
    to hide stuff.

    Cheers

    Terry MacDonald
    Senior STIX Subject Matter Expert
    SOLTRA An FS-ISAC and DTCC Company
    +61 (407) 203 206 terry@soltra.com



    From: Davidson II, Mark S [ mailto:mdavidson@mitre.org ]

    Sent: Friday, 30 October 2015 5:05 AM
    To: Jordan, Bret < bret.jordan@bluecoat.com >;
    Barnum, Sean D. < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >;
    Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >;
    Wunder, John A. < jwunder@mitre.org >;
    cti-stix@lists.oasis-open.org
    Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    If want the ability to dereference arbitrary STIX IDs (for use in accessing some kind of repository, let’s say), then I think requiring a rule whereby STIX IDs can be turned into a URL could be a good requirement (Note: URLs as IDs would satisfy this requirement).
    While there is a concept for idref today, I personally haven’t seen an implementation that dereferences STIX IDs outside of the document containing the idref.

    Thank you.
    -Mark

    PS, a notional example: <stix:Indicator idref=” https://example.org/stix121/indicators/123 ”/>

















    From:
    cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ]
    On Behalf Of Jordan, Bret
    Sent: Thursday, October 29, 2015 1:03 PM
    To: Barnum, Sean D. < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >;
    Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >;
    Wunder, John A. < jwunder@mitre.org >;
    cti-stix@lists.oasis-open.org
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Let's just make sure we do not build an ID system that is so vast that it can enumerate every atom in the known universe.


    Bret

    Sent from my Commodore 64

















    STIX SC Co-chair







































    [attachment "signature.asc" deleted by Jason Keirstead/CanEast/IBM]
































  • 11.  RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 23:36




    Hi Jason,
     
    That’s not strictly correct. Firewalls have logs. IDS’s have logs and sometimes even full packet capture (Endace, Mocloch). Sandboxes
    often store the actual malware they have processed. It is quite possible that there is more information available.
     
    Yet it is also possible that they don’t. It is possible that the data has expired from their data store and that there is only a log
    entry left. Or that the logs have rolled over and now there is nothing left.
     
    We need to support both potential situations.
     
    I think that there will be some times that a security tool producing STIX Sightings will be smart enough to detect that it is sending
    something its seen before and will reuse the previous ID, but other times it will not.

     
    Sometimes the STIX repository will need to work out that two things are matching themselves. I am a proponent of using the data structure
    to extract the basic parts of the Observables and then use those to find duplicates. In other words:
     
    STIX IndicatorA -> STIX ObservableA -> CybOX AddressA -> IPv4 Address Database Entry <- CybOX AddressB <- STIX ObservableB <- STIX
    IndicatorB
     
    In this way, even if the security tools don’t do deduplication we can find relationships ourselves through the data itself, and then
    can form our own ‘STIXified’ relationship objects to more formally demonstrate the STIX relationship between the STIX objects.
     
    Cheers
     

    Terry MacDonald
    Senior STIX Subject Matter Expert
    SOLTRA   An FS-ISAC and DTCC Company
    +61 (407) 203 206
    terry@soltra.com

     

     


    From: cti-stix@lists.oasis-open.org [mailto:cti-stix@lists.oasis-open.org]
    On Behalf Of Jason Keirstead
    Sent: Saturday, 31 October 2015 5:14 AM
    To: Wunder, John A. <jwunder@mitre.org>
    Cc: cti-stix@lists.oasis-open.org
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0


     
    That is kind of the point - there is no way to go back to these automated systems and ask for more info - they don't have it... they have no systems of record to store it in. This will be true of all kinds of security devices:
    Firewall
    IPS
    NGFW
    App Sandbox
    Endpoint protection *

    * Most endpoints have a system of record of IOCs up on a management console somewhere, but not always

    All of these device classes could reasonably directly produce observables and sightings, but none of them have systems of record that can make use of IDs for querying.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    "Wunder,
    John A." ---2015/10/30 03:10:28 PM---But in those cases wouldn’t the consumers want some way to go back to the producers and ask for more

    From: "Wunder, John A." < jwunder@mitre.org >
    To: " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Date: 2015/10/30 03:10 PM
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >










    But in those cases wouldn’t the consumers want some way to go back to the producers and ask for more info? Or, when they do, do you think they would just go back with the entire sighting rather than an ID?


    It just seems like we have this standard ID mechanism on most things and we should have a very good reason to not follow that pattern here.
    On Oct 30, 2015, at 1:56 PM, Jordan, Bret < bret.jordan@BLUECOAT.COM >
    wrote:

    I think on the surface it may seem like they are different and the Org to Org sharing will be easier. But that is only the case when you have a very finite number of people contributing to the eco-system. The problem becomes more
    complex when every SOC in every major enterprise and mom-n-pop shop starts emitting an Indicator+CybOX+MAEC for the same exact piece of Malware. You could easily have 10,000 IDs for exactly the same thing.


    Thanks,

    Bret



    Bret Jordan CISSP

    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."

    On Oct 30, 2015, at 11:50, Wunder, John A. < jwunder@mitre.org >
    wrote:

    I know we hate optionality, but they could be optional. It kind of gets to Jon Baker’s earlier point that organizational sightings have a different use case (and therefore different requirements) than internal tool-based sightings
    and the same field set may not solve both problems.

    John
    On Oct 30, 2015, at 1:42 PM, Jason Keirstead < Jason.Keirstead@CA.IBM.COM >
    wrote:
    So then the question becomes - if the consumers are not using the IDs, then why are they required...
    " That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more
    info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. "

    I am against a mandatory 32 or 64 or whatever bytes in every sighting message if usually the bytes don't have any meaning behind them.


    And to again re-iterate - this problem is beyond sightings... it certainly exists for many classes of observables, and sometimes even indicators.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> "Wunder, John A." ---2015/10/30 02:36:27 PM---Do you think tools will be doing correlation based on ID or doing correlation based on the contents

    From: "Wunder, John A." < jwunder@mitre.org >
    To: "Jordan, Bret" < bret.jordan@BLUECOAT.COM >
    Cc: Jason Keirstead/CanEast/IBM@IBMCA, Terry MacDonald < terry@soltra.com >, "Davidson II, Mark S" < mdavidson@mitre.org >, "Barnum, Sean D." < sbarnum@mitre.org >,
    Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, " cti-stix@lists.oasis-open.org "
    < cti-stix@lists.oasis-open.org >
    Date: 2015/10/30 02:36 PM
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >










    Do you think tools will be doing correlation based on ID or doing correlation based on the contents of an observable?


    As an example, imagine you have a sighting for an e-mail:

    - Subject: PLS OPEN ME KTHXBYE
    - From: defnotaspammer@example.com
    - Attachment: (some hash)

    Then you have this other sighting:

    - Subject: PLS OPEN ME KTHXBYE
    - From: defnotaspammer@example.com
    - Attachment: (some other hash)

    Then this one:

    - Subject: PLS OPEN ME KTHXBYE
    - From: defnotaspammer@example.com

    Which of those should match? I feel like we’re talking about this as if sightings are either the same or different when in reality there will mostly likely be degrees of similarity (0-100). So my conclusion is that IDs, even generated based on the content,
    are probably not all that useful for matching sightings.

    That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings won’t
    persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it.

    John
    On Oct 30, 2015, at 1:24 PM, Jordan, Bret < bret.jordan@BLUECOAT.COM >
    wrote:

    Really good points Jason.... It is amazing how things like this bubble up as you start writing code. I can now see how the ID and IDREF elements will break down rapidly and fall apart in to little pieces all over the floor. Maybe the ID and IDREF thing needs
    to happen in a WorkBench tool that is listening on a TAXII channel.... ???


    We just need to figure out how devices can emit things they see in STIX format based on a rule or policy.



    Thanks,

    Bret



    Bret Jordan CISSP

    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."

    On Oct 30, 2015, at 10:51, Jason Keirstead < Jason.Keirstead@ca.ibm.com >
    wrote:
    So here is my question.
    " Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel.
    "

    How is that firewall going to generate and persist that observable ID to be re-referenced by the "light bulb sighting"? Because if he sees the same "something bad" 1 minute, hour, or day later, he should be sending the same observable ID - otherwise, the sightings
    numbers would all be reset every time he sees it.

    IE - the problem I describe extends beyond sightings, it also extends to observables and even indicators. Most producers of this information won't have the ways and means to build a giant database (of ie. all of the IP addresses they have ever seen) so that
    they know they will re-use the same ID if they want to re-emit an observable. As such if they want an ID that can be re-referenceable, they will have to generate an ID based on the current data, since the current data is all they have to go on.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> "Jordan, Bret" ---2015/10/30 12:36:36 PM---Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me expla

    From: "Jordan, Bret" < bret.jordan@bluecoat.com >
    To: Jason Keirstead/CanEast/IBM@IBMCA
    Cc: Terry MacDonald < terry@soltra.com >, Mark Davidson < mdavidson@mitre.org >,
    "Sean D. Barnum" < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >,
    "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, "Wunder, John A." < jwunder@mitre.org >,
    " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Date: 2015/10/30 12:36 PM
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >










    Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me explain how I see the workflow going....


    Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. All of the end point devices (clients, phones, printers, ip enabled light bulbs) can see that indicator and respond with a sighting if the so desire.

    The sighting will have an IDREF or similar back to the objects it is referencing. Now the original client or a message handler running on the TAXII server (if the TAXII server is a broker + query repo) could pick up and aggregate all of the sightings coming
    back for that original observable and either store it or do something with it. In the TAXII server case (broker + repo) it might store the data in a database or bubble it up to an analyst for review before sending it out a different channel group.




    Thanks,

    Bret



    Bret Jordan CISSP
    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."

    On Oct 30, 2015, at 06:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com >
    wrote:
    I know historically I have been pushing for an RFC-Compliant UUID as mandatory component of this - now i am going to backtrack on my previous argument :)

    I actually think that having a UUID be mandatory is not workable, and here is why: For many (most?) products looking to produce observable and sightings, there is no system-wide "ID" in their product that could be used to represent something like an observable.
    Similarly, STIX producers like embedded devices and endpoints, do not have the resources or processing capacity to start storing these relationships. As such, said producers have two options for generating sightings:


    a) Have a randomly-generated UUID (which is of no use to anyone in the end because it will remove all traceability and create rampant data duplication)

    b) Have an algorithmically derived ID based on the data (IE, any time I issue an observable for Equals 1.2.3.4, the same ID will be derived)

    (b) Is really the only workable ID mechanism for most products.

    I have recently started to run into this in practice in my own product work, so I know it is a real problem that is going to hit a lot of people if we start mandating IDs and UUIDs.


    Here is an assertion - why is ID even a mandatory field for a sighting? I am not sure why it is useful. If a STIX repository needs an ID for an internal record, it can generate its own in any way it wants. I am not sure why a producer needs to specify an ID.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> Terry MacDonald ---2015/10/29 06:51:35 PM---Mark, That should change with the top-level relationship object. It will be quite possible to send j

    From: Terry MacDonald < terry@soltra.com >
    To: "Davidson II, Mark S" < mdavidson@mitre.org >, "Jordan, Bret" < bret.jordan@bluecoat.com >,
    "Barnum, Sean D." < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >,
    "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org "
    < cti-stix@lists.oasis-open.org >
    Date: 2015/10/29 06:51 PM
    Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >










    Mark,

    That should change with the top-level relationship object. It will be quite possible to send just a relationship object in a package. This will mean that the consumer will need the ability to contact the original producer of the reference STIX data object to
    ask if they are allowed the full object rather than just the reference to it. Having the ability to find the TAXII server from just the STIX object ID is critical to allow this to happen.

    This functionality also allows more secretive providers to ‘hide’ their data, such that consumers can understand that relationships exist, but that only a small subset of approved consumers will have access to the actual STIX object data. It gives the ability
    to hide stuff.

    Cheers

    Terry MacDonald
    Senior STIX Subject Matter Expert
    SOLTRA An FS-ISAC and DTCC Company
    +61 (407) 203 206 terry@soltra.com



    From: Davidson II, Mark S [ mailto:mdavidson@mitre.org ]

    Sent: Friday, 30 October 2015 5:05 AM
    To: Jordan, Bret < bret.jordan@bluecoat.com >; Barnum, Sean D. < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >;
    Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >;
    cti-stix@lists.oasis-open.org
    Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    If want the ability to dereference arbitrary STIX IDs (for use in accessing some kind of repository, let’s say), then I think requiring a rule whereby STIX IDs can be turned into a URL could be a good requirement (Note: URLs as IDs would satisfy this requirement).
    While there is a concept for idref today, I personally haven’t seen an implementation that dereferences STIX IDs outside of the document containing the idref.

    Thank you.
    -Mark

    PS, a notional example: <stix:Indicator idref=” https://example.org/stix121/indicators/123 ”/>

    From:
    cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ]
    On Behalf Of Jordan, Bret
    Sent: Thursday, October 29, 2015 1:03 PM
    To: Barnum, Sean D. < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >;
    Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >;
    cti-stix@lists.oasis-open.org
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Let's just make sure we do not build an ID system that is so vast that it can enumerate every atom in the known universe.


    Bret

    Sent from my Commodore 64

    STIX SC Co-chair
    [attachment "signature.asc" deleted by Jason Keirstead/CanEast/IBM]


     









  • 12.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 11-02-2015 03:05
    Emitting an indicator based on a rule or workflow is a lot easier problem for a vendor to solve than allowing someone to query them through a means other than their own existing API.  Long term I think we can get there, but it will take some time.  This is one of the reasons we are looking at HTTP / REST / JSON for TAXII, since most network and security product vendors use that stack for their APIs today.  This should make adoption of TAXII 2.0 a much easier pill to swallow.   Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Oct 30, 2015, at 18:35, Terry MacDonald < terry@soltra.com > wrote: Hi Jason,   That’s not strictly correct. Firewalls have logs. IDS’s have logs and sometimes even full packet capture (Endace, Mocloch). Sandboxes often store the actual malware they have processed. It is quite possible that there is more information available.   Yet it is also possible that they don’t. It is possible that the data has expired from their data store and that there is only a log entry left. Or that the logs have rolled over and now there is nothing left.   We need to support both potential situations.   I think that there will be some times that a security tool producing STIX Sightings will be smart enough to detect that it is sending something its seen before and will reuse the previous ID, but other times it will not.   Sometimes the STIX repository will need to work out that two things are matching themselves. I am a proponent of using the data structure to extract the basic parts of the Observables and then use those to find duplicates. In other words:   STIX IndicatorA -> STIX ObservableA -> CybOX AddressA -> IPv4 Address Database Entry <- CybOX AddressB <- STIX ObservableB <- STIX IndicatorB   In this way, even if the security tools don’t do deduplication we can find relationships ourselves through the data itself, and then can form our own ‘STIXified’ relationship objects to more formally demonstrate the STIX relationship between the STIX objects.   Cheers   Terry MacDonald Senior STIX Subject Matter Expert SOLTRA   An FS-ISAC and DTCC Company +61 (407) 203 206   terry@soltra.com     From:   cti-stix@lists.oasis-open.org   [ mailto:cti-stix@lists.oasis-open.org ]   On Behalf Of   Jason Keirstead Sent:   Saturday, 31 October 2015 5:14 AM To:   Wunder, John A. < jwunder@mitre.org > Cc:   cti-stix@lists.oasis-open.org Subject:   Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0   That is kind of the point - there is no way to go back to these automated systems and ask for more info - they don't have it... they have no systems of record to store it in. This will be true of all kinds of security devices: Firewall IPS NGFW App Sandbox Endpoint protection * * Most endpoints have a system of record of IOCs up on a management console somewhere, but not always All of these device classes could reasonably directly produce observables and sightings, but none of them have systems of record that can make use of IDs for querying. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security     www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown   <image001.gif> Wunder, John A. ---2015/10/30 03:10:28 PM---But in those cases wouldn’t the consumers want some way to go back to the producers and ask for more From:   Wunder, John A. < jwunder@mitre.org > To:   cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Date:   2015/10/30 03:10 PM Subject:   Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by:   < cti-stix@lists.oasis-open.org > But in those cases wouldn’t the consumers want some way to go back to the producers and ask for more info? Or, when they do, do you think they would just go back with the entire sighting rather than an ID?   It just seems like we have this standard ID mechanism on most things and we should have a very good reason to not follow that pattern here. On Oct 30, 2015, at 1:56 PM, Jordan, Bret < bret.jordan@BLUECOAT.COM > wrote: I think on the surface it may seem like they are different and the Org to Org sharing will be easier. But that is only the case when you have a very finite number of people contributing to the eco-system. The problem becomes more complex when every SOC in every major enterprise and mom-n-pop shop starts emitting an Indicator+CybOX+MAEC for the same exact piece of Malware. You could easily have 10,000 IDs for exactly the same thing. Thanks, Bret Bret Jordan CISSP   Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg. On Oct 30, 2015, at 11:50, Wunder, John A. < jwunder@mitre.org > wrote: I know we hate optionality, but they could be optional. It kind of gets to Jon Baker’s earlier point that organizational sightings have a different use case (and therefore different requirements) than internal tool-based sightings and the same field set may not solve both problems.   John On Oct 30, 2015, at 1:42 PM, Jason Keirstead < Jason.Keirstead@CA.IBM.COM > wrote: So then the question becomes - if the consumers are not using the IDs, then why are they required... That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. I am against a mandatory 32 or 64 or whatever bytes in every sighting message if usually the bytes don't have any meaning behind them.   And to again re-iterate - this problem is beyond sightings... it certainly exists for many classes of observables, and sometimes even indicators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security     www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown   <graycol.gif> Wunder, John A. ---2015/10/30 02:36:27 PM---Do you think tools will be doing correlation based on ID or doing correlation based on the contents From:   Wunder, John A. < jwunder@mitre.org > To:   Jordan, Bret < bret.jordan@BLUECOAT.COM > Cc:   Jason Keirstead/CanEast/IBM@IBMCA, Terry MacDonald < terry@soltra.com >, Davidson II, Mark S < mdavidson@mitre.org >, Barnum, Sean D. < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >, Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Date:   2015/10/30 02:36 PM Subject:   Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by:   < cti-stix@lists.oasis-open.org > Do you think tools will be doing correlation based on ID or doing correlation based on the contents of an observable?   As an example, imagine you have a sighting for an e-mail: - Subject: PLS OPEN ME KTHXBYE - From:   defnotaspammer@example.com - Attachment: (some hash) Then you have this other sighting: - Subject: PLS OPEN ME KTHXBYE - From:   defnotaspammer@example.com - Attachment: (some other hash) Then this one: - Subject: PLS OPEN ME KTHXBYE - From:   defnotaspammer@example.com Which of those should match? I feel like we’re talking about this as if sightings are either the same or different when in reality there will mostly likely be degrees of similarity (0-100). So my conclusion is that IDs, even generated based on the content, are probably not all that useful for matching sightings. That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. John On Oct 30, 2015, at 1:24 PM, Jordan, Bret < bret.jordan@BLUECOAT.COM > wrote: Really good points Jason.... It is amazing how things like this bubble up as you start writing code. I can now see how the ID and IDREF elements will break down rapidly and fall apart in to little pieces all over the floor. Maybe the ID and IDREF thing needs to happen in a WorkBench tool that is listening on a TAXII channel.... ???   We just need to figure out how devices can emit things they see in STIX format based on a rule or policy.   Thanks, Bret Bret Jordan CISSP   Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg. On Oct 30, 2015, at 10:51, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: So here is my question. Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel.   How is that firewall going to generate and persist that observable ID to be re-referenced by the light bulb sighting ? Because if he sees the same something bad 1 minute, hour, or day later, he should be sending the same observable ID - otherwise, the sightings numbers would all be reset every time he sees it. IE - the problem I describe extends beyond sightings, it also extends to observables and even indicators. Most producers of this information won't have the ways and means to build a giant database (of ie. all of the IP addresses they have ever seen) so that they know they will re-use the same ID if they want to re-emit an observable. As such if they want an ID that can be re-referenceable, they will have to generate an ID based on the current data, since the current data is all they have to go on. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security     www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown   <graycol.gif> Jordan, Bret ---2015/10/30 12:36:36 PM---Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me expla From:   Jordan, Bret < bret.jordan@bluecoat.com > To:   Jason Keirstead/CanEast/IBM@IBMCA Cc:   Terry MacDonald < terry@soltra.com >, Mark Davidson < mdavidson@mitre.org >, Sean D. Barnum < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >, Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >, Wunder, John A. < jwunder@mitre.org >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Date:   2015/10/30 12:36 PM Subject:   Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by:   < cti-stix@lists.oasis-open.org > Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me explain how I see the workflow going.... Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. All of the end point devices (clients, phones, printers, ip enabled light bulbs) can see that indicator and respond with a sighting if the so desire. The sighting will have an IDREF or similar back to the objects it is referencing. Now the original client or a message handler running on the TAXII server (if the TAXII server is a broker + query repo) could pick up and aggregate all of the sightings coming back for that original observable and either store it or do something with it. In the TAXII server case (broker + repo) it might store the data in a database or bubble it up to an analyst for review before sending it out a different channel group.   Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg. On Oct 30, 2015, at 06:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I know historically I have been pushing for an RFC-Compliant UUID as mandatory component of this - now i am going to backtrack on my previous argument :) I actually think that having a UUID be mandatory is not workable, and here is why: For many (most?) products looking to produce observable and sightings, there is no system-wide ID in their product that could be used to represent something like an observable. Similarly, STIX producers like embedded devices and endpoints, do not have the resources or processing capacity to start storing these relationships. As such, said producers have two options for generating sightings: a) Have a randomly-generated UUID (which is of no use to anyone in the end because it will remove all traceability and create rampant data duplication) b) Have an algorithmically derived ID based on the data (IE, any time I issue an observable for Equals 1.2.3.4, the same ID will be derived) (b) Is really the only workable ID mechanism for most products.   I have recently started to run into this in practice in my own product work, so I know it is a real problem that is going to hit a lot of people if we start mandating IDs and UUIDs.   Here is an assertion - why is ID even a mandatory field for a sighting? I am not sure why it is useful. If a STIX repository needs an ID for an internal record, it can generate its own in any way it wants. I am not sure why a producer needs to specify an ID. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security   www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown   <graycol.gif> Terry MacDonald ---2015/10/29 06:51:35 PM---Mark, That should change with the top-level relationship object. It will be quite possible to send j From:   Terry MacDonald < terry@soltra.com > To:   Davidson II, Mark S < mdavidson@mitre.org >, Jordan, Bret < bret.jordan@bluecoat.com >, Barnum, Sean D. < sbarnum@mitre.org > Cc:   Jerome Athias < athiasjerome@gmail.com >, Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >, Wunder, John A. < jwunder@mitre.org >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Date:   2015/10/29 06:51 PM Subject:   RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by:   < cti-stix@lists.oasis-open.org > Mark, That should change with the top-level relationship object. It will be quite possible to send just a relationship object in a package. This will mean that the consumer will need the ability to contact the original producer of the reference STIX data object to ask if they are allowed the full object rather than just the reference to it. Having the ability to find the TAXII server from just the STIX object ID is critical to allow this to happen. This functionality also allows more secretive providers to ‘hide’ their data, such that consumers can understand that relationships exist, but that only a small subset of approved consumers will have access to the actual STIX object data. It gives the ability to hide stuff. Cheers Terry MacDonald Senior STIX Subject Matter Expert SOLTRA   An FS-ISAC and DTCC Company +61 (407) 203 206   terry@soltra.com   From:   Davidson II, Mark S [ mailto:mdavidson@mitre.org ] Sent:   Friday, 30 October 2015 5:05 AM To:   Jordan, Bret < bret.jordan@bluecoat.com >; Barnum, Sean D. < sbarnum@mitre.org > Cc:   Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >;   cti-stix@lists.oasis-open.org Subject:   RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 If want the ability to dereference arbitrary STIX IDs (for use in accessing some kind of repository, let’s say), then I think requiring a rule whereby STIX IDs can be turned into a URL could be a good requirement (Note: URLs as IDs would satisfy this requirement). While there is a concept for idref today, I personally haven’t seen an implementation that dereferences STIX IDs outside of the document containing the idref. Thank you. -Mark PS, a notional example: <stix:Indicator idref=” https://example.org/stix121/indicators/123 ”/> From:   cti-stix@lists.oasis-open.org   [ mailto:cti-stix@lists.oasis-open.org ]   On Behalf Of   Jordan, Bret Sent:   Thursday, October 29, 2015 1:03 PM To:   Barnum, Sean D. < sbarnum@mitre.org > Cc:   Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >;   cti-stix@lists.oasis-open.org Subject:   Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Let's just make sure we do not build an ID system that is so vast that it can enumerate every atom in the known universe.   Bret   Sent from my Commodore 64 STIX SC Co-chair [attachment signature.asc deleted by Jason Keirstead/CanEast/IBM] Attachment: signature.asc Description: Message signed with OpenPGP using GPGMail


  • 13.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 11-04-2015 10:03
    On 30.10.2015 14:14:23, Jason Keirstead wrote: > > All of these device classes could reasonably directly produce > observables and sightings, but none of them have systems of record > that can make use of IDs for querying. > Maybe these device classes *currently* don't have a system of record for STIX they have emitted however all of these device classes *do* run on top of databases and for the most part support some sort of API. For the most part, the fielded versions of these device classes have *zero* support for STIX/TAXII (much less STIX/TAXII 2.0!). But there's no technical reason why, when these vendors decide to release a new version that supports STIX/TAXII 2.0, they can extend the schema of their underlying database to support the aforementioned system of record. -- Cheers, Trey -- Trey Darley Senior Security Engineer 4DAA 0A88 34BC 27C9 FD2B A97E D3C6 5C74 0FB7 E430 Soltra An FS-ISAC & DTCC Company www.soltra.com -- "It is more complicated than you think." --RFC 1925 Attachment: signature.asc Description: PGP signature


  • 14.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 18:18
    I think as we start developing tools and integrating things in products, we are beginning to see the problems that we need to address in STIX 2.0.  A lot of assumptions where made about the current ID being global de-referenceable and what we are seeing is that may not always be possible.  Clients may not be able to talk to the internet at all or may not have a route to repo in question, the producer may not keep the information and may just be an emit and forget.   Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Oct 30, 2015, at 12:10, Wunder, John A. < jwunder@mitre.org > wrote: But in those cases wouldn’t the consumers want some way to go back to the producers and ask for more info? Or, when they do, do you think they would just go back with the entire sighting rather than an ID? It just seems like we have this standard ID mechanism on most things and we should have a very good reason to not follow that pattern here. On Oct 30, 2015, at 1:56 PM, Jordan, Bret < bret.jordan@BLUECOAT.COM > wrote: I think on the surface it may seem like they are different and the Org to Org sharing will be easier.  But that is only the case when you have a very finite number of people contributing to the eco-system.  The problem becomes more complex when every SOC in every major enterprise and mom-n-pop shop starts emitting an Indicator+CybOX+MAEC for the same exact piece of Malware. You could easily have 10,000 IDs for exactly the same thing. Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Oct 30, 2015, at 11:50, Wunder, John A. < jwunder@mitre.org > wrote: I know we hate optionality, but they could be optional. It kind of gets to Jon Baker’s earlier point that organizational sightings have a different use case (and therefore different requirements) than internal tool-based sightings and the same field set may not solve both problems. John On Oct 30, 2015, at 1:42 PM, Jason Keirstead < Jason.Keirstead@CA.IBM.COM > wrote: So then the question becomes - if the consumers are not using the IDs, then why are they required... That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. I am against a mandatory 32 or 64 or whatever bytes in every sighting message if usually the bytes don't have any meaning behind them. And to again re-iterate - this problem is beyond sightings... it certainly exists for many classes of observables, and sometimes even indicators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Wunder, John A. ---2015/10/30 02:36:27 PM---Do you think tools will be doing correlation based on ID or doing correlation based on the contents From: Wunder, John A. < jwunder@mitre.org > To: Jordan, Bret < bret.jordan@BLUECOAT.COM > Cc: Jason Keirstead/CanEast/IBM@IBMCA, Terry MacDonald < terry@soltra.com >, Davidson II, Mark S < mdavidson@mitre.org >, Barnum, Sean D. < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >, Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Date: 2015/10/30 02:36 PM Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Do you think tools will be doing correlation based on ID or doing correlation based on the contents of an observable? As an example, imagine you have a sighting for an e-mail: - Subject: PLS OPEN ME KTHXBYE - From: defnotaspammer@example.com - Attachment: (some hash) Then you have this other sighting: - Subject: PLS OPEN ME KTHXBYE - From: defnotaspammer@example.com - Attachment: (some other hash) Then this one: - Subject: PLS OPEN ME KTHXBYE - From: defnotaspammer@example.com Which of those should match? I feel like we’re talking about this as if sightings are either the same or different when in reality there will mostly likely be degrees of similarity (0-100). So my conclusion is that IDs, even generated based on the content, are probably not all that useful for matching sightings. That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. John On Oct 30, 2015, at 1:24 PM, Jordan, Bret < bret.jordan@BLUECOAT.COM > wrote: Really good points Jason.... It is amazing how things like this bubble up as you start writing code. I can now see how the ID and IDREF elements will break down rapidly and fall apart in to little pieces all over the floor. Maybe the ID and IDREF thing needs to happen in a WorkBench tool that is listening on a TAXII channel.... ??? We just need to figure out how devices can emit things they see in STIX format based on a rule or policy. Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg. On Oct 30, 2015, at 10:51, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: So here is my question. Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. How is that firewall going to generate and persist that observable ID to be re-referenced by the light bulb sighting ? Because if he sees the same something bad 1 minute, hour, or day later, he should be sending the same observable ID - otherwise, the sightings numbers would all be reset every time he sees it. IE - the problem I describe extends beyond sightings, it also extends to observables and even indicators. Most producers of this information won't have the ways and means to build a giant database (of ie. all of the IP addresses they have ever seen) so that they know they will re-use the same ID if they want to re-emit an observable. As such if they want an ID that can be re-referenceable, they will have to generate an ID based on the current data, since the current data is all they have to go on. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Jordan, Bret ---2015/10/30 12:36:36 PM---Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me expla From: Jordan, Bret < bret.jordan@bluecoat.com > To: Jason Keirstead/CanEast/IBM@IBMCA Cc: Terry MacDonald < terry@soltra.com >, Mark Davidson < mdavidson@mitre.org >, Sean D. Barnum < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >, Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >, Wunder, John A. < jwunder@mitre.org >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Date: 2015/10/30 12:36 PM Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me explain how I see the workflow going.... Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. All of the end point devices (clients, phones, printers, ip enabled light bulbs) can see that indicator and respond with a sighting if the so desire. The sighting will have an IDREF or similar back to the objects it is referencing. Now the original client or a message handler running on the TAXII server (if the TAXII server is a broker + query repo) could pick up and aggregate all of the sightings coming back for that original observable and either store it or do something with it. In the TAXII server case (broker + repo) it might store the data in a database or bubble it up to an analyst for review before sending it out a different channel group. Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg. On Oct 30, 2015, at 06:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I know historically I have been pushing for an RFC-Compliant UUID as mandatory component of this - now i am going to backtrack on my previous argument :) I actually think that having a UUID be mandatory is not workable, and here is why: For many (most?) products looking to produce observable and sightings, there is no system-wide ID in their product that could be used to represent something like an observable. Similarly, STIX producers like embedded devices and endpoints, do not have the resources or processing capacity to start storing these relationships. As such, said producers have two options for generating sightings: a) Have a randomly-generated UUID (which is of no use to anyone in the end because it will remove all traceability and create rampant data duplication) b) Have an algorithmically derived ID based on the data (IE, any time I issue an observable for Equals 1.2.3.4, the same ID will be derived) (b) Is really the only workable ID mechanism for most products. I have recently started to run into this in practice in my own product work, so I know it is a real problem that is going to hit a lot of people if we start mandating IDs and UUIDs. Here is an assertion - why is ID even a mandatory field for a sighting? I am not sure why it is useful. If a STIX repository needs an ID for an internal record, it can generate its own in any way it wants. I am not sure why a producer needs to specify an ID. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Terry MacDonald ---2015/10/29 06:51:35 PM---Mark, That should change with the top-level relationship object. It will be quite possible to send j From: Terry MacDonald < terry@soltra.com > To: Davidson II, Mark S < mdavidson@mitre.org >, Jordan, Bret < bret.jordan@bluecoat.com >, Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >, Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >, Wunder, John A. < jwunder@mitre.org >, cti-stix@lists.oasis-open.org < cti-stix@lists.oasis-open.org > Date: 2015/10/29 06:51 PM Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Mark, That should change with the top-level relationship object. It will be quite possible to send just a relationship object in a package. This will mean that the consumer will need the ability to contact the original producer of the reference STIX data object to ask if they are allowed the full object rather than just the reference to it. Having the ability to find the TAXII server from just the STIX object ID is critical to allow this to happen. This functionality also allows more secretive providers to ‘hide’ their data, such that consumers can understand that relationships exist, but that only a small subset of approved consumers will have access to the actual STIX object data. It gives the ability to hide stuff. Cheers Terry MacDonald Senior STIX Subject Matter Expert SOLTRA An FS-ISAC and DTCC Company +61 (407) 203 206 terry@soltra.com From: Davidson II, Mark S [ mailto:mdavidson@mitre.org ] Sent: Friday, 30 October 2015 5:05 AM To: Jordan, Bret < bret.jordan@bluecoat.com >; Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >; cti-stix@lists.oasis-open.org Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 If want the ability to dereference arbitrary STIX IDs (for use in accessing some kind of repository, let’s say), then I think requiring a rule whereby STIX IDs can be turned into a URL could be a good requirement (Note: URLs as IDs would satisfy this requirement). While there is a concept for idref today, I personally haven’t seen an implementation that dereferences STIX IDs outside of the document containing the idref. Thank you. -Mark PS, a notional example: <stix:Indicator idref=” https://example.org/stix121/indicators/123 ”/> From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Jordan, Bret Sent: Thursday, October 29, 2015 1:03 PM To: Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Let's just make sure we do not build an ID system that is so vast that it can enumerate every atom in the known universe. Bret Sent from my Commodore 64 STIX SC Co-chair [attachment signature.asc deleted by Jason Keirstead/CanEast/IBM] Attachment: signature.asc Description: Message signed with OpenPGP using GPGMail


  • 15.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 17:54
    Lets run the FW use case to the ground, since most everyone should understand it... FW 1 see a series of weaponized PDFs come down.  Say it sees the same Weaponized PDF 2,000 times over a period of 3 days.  A large phishing attack with a lot of click happy users.  1) Now it is highly unlikely with the current model that the FW will remember and use the same ID value (UUID) for each Indicator+Observable+MAEC data blob it issues for this Weaponized PDF.  In fact, it will probably have 2,000 different UUID IDs for the same Indicator.  2) Now when you compound this by 60,000 client in the network issuing Sightings, this becomes to blow up quickly. Maybe... Just maybe....  The FW could take the JSON Indicator that it is going to issue and hash the data blob and use that hash as the ID.  Then at least each FW that is running the same code and is seeing basically the same thing with the same amount of data-enrichment, will issue the same ID value.   We will have a totally different problem in TAXII Land in the Query REST API.  Because you will probably want to do something like: /t2/query/indicator/file_name/FreeFood.pdf  or /t2/query/indicator/file_hash/<some file hash of the PDF> Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg.   On Oct 30, 2015, at 11:42, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: So then the question becomes - if the consumers are not using the IDs, then why are they required... That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. I am against a mandatory 32 or 64 or whatever bytes in every sighting message if usually the bytes don't have any meaning behind them. And to again re-iterate - this problem is beyond sightings... it certainly exists for many classes of observables, and sometimes even indicators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown Attachment: signature.asc Description: Message signed with OpenPGP using GPGMail


  • 16.  RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 22:32




    Um, why do we want the same ID? If the attacker has sent our Org the same pdf 2000 times then don’t we want to record that fact, and
    link the Sighting objects (with Observable Instances) to the Incident object with 2000 relationship objects? Then don’t we want to also send that group of Incident, Sightings, Observables and Relationships to others in our Threat Sharing group so that they
    are aware of them? That is accurate.
     
    If we are worried about the size of storing the PDF multiple times, then it is up to the implementation to recognize that the MD5 of
    the attachment item is the same and then actually only store it once (just like MS Exchange servers have been doing since mid-2000’s).
     
    How do we identify to others that the above data came from us?

     
    If the ID of the object just generated from the <HashofContent> then there is no easy way to do this. If the ID of the object generated
    from the namespace.<HashofContent> then we have more chance.
     
    But what happens if we decide to update the Incident? The ID is now namespace.<NewHashofContent>. Now how do we de-duplicate? Do we
    now have to puclish a relationship object explicitly stating the is a replacement object for the namespace.<HashofContent> object?

     
    And what about relationship objects? Part of the power of separate top-level objects is that we can now just tell people about the
    relationship, but we can keep the actual data node it refers to a secret. Therefore in some implementations the only link to tie relationships together is the fact both relationships share an ID:
     
    e.g

    RelationshipA (src: CampaignA -> Threat ActorA)
    RelationshipB (src: IndicatorA -> CampaignA)
    RelationshipC (src: IndicatorB -> CampaignA)
     
    The recipient may not have the CampaignA data or ThreatActorA data, but they will still know that the IndicatorA and IndicatorB are
    related to the same campaign thanks to the relationship contains in the same IDs.
    This completely breaks if the ID’s change over time.
     
    We need an ID solution that:
    -          
    Includes the domain namespace in the ID so that recipients know where to ask for more information.
    -          
    The ID stays the same over the lifetime of the object even if it is updated and the content changes.
    -          
    Recognizes that IDs will be coming from many different companies and many different sources and that we ned a way of easily
    understanding who produced the data.
     
    To go over the FW use case again
     
    1.       
    FW 1 see a series of weaponized PDFs come down through email.  For each weaponized PDF email it detects, it creates a detection
    alert and sends that to its FW mgmt server.
    2.       
    The FW mgmt. server has STIX/TAXII capabilities. For the first detection alert that the FW MGMT receives, it creates a STIX
    v2 Sighting object, and a corresponding STIX Observable containing a CybOX EmailMessage Object and a related File object, and two relationship objects to join the STIX Sighting to the Observables.
    It stores a mapping of the Observable SHA256 / file ID in a local internal data table for the EmailMessage and the File. It sends these out on the TAXII channel that it was configured to use.

    3.       
    The main TAXII repository receives this STIX v2 Sighting object and the corresponding STIX Observable containing a CybOX
    an EmailMessage Object and a related File object, and adds them to its repository.
    4.       
    For the second detection alert that the FW MGMT receives, it does a SHA256 hash of the Email contents and the attached File
    independently to see if it’s seen them before. It hasn’t seen the EmailMessage before, but it has seen the attached PDF.
    5.       
    it creates a STIX v2 Sighting object, and a corresponding STIX Observable containing a new CybOX EmailMessage Object (email
    address was different). The EmailMessage contains the idref of the previously generated File object. It also adds two relationship objects to join the new STIX Sighting to the Observables.  It sends these out on the TAXII channel that it was configured to
    use.
    6.       
    The main TAXII repository receives this second detection STIX v2 content, and adds them to its repository.
    7.       
    The next detection alerts each will create a new Sighting object, new EmailMessage object but will refer to the same File
    object. Relationships will be created between these objects as well.
     
    At this point, the main taxi repo knows that the File objects are all related.
     
    Cheers
     

    Terry MacDonald
    Senior STIX Subject Matter Expert
    SOLTRA   An FS-ISAC and DTCC Company
    +61 (407) 203 206
    terry@soltra.com

     

     


    From: Jordan, Bret [mailto:bret.jordan@bluecoat.com]

    Sent: Saturday, 31 October 2015 4:54 AM
    To: Jason Keirstead <Jason.Keirstead@ca.ibm.com>
    Cc: Wunder, John A. <jwunder@mitre.org>; Terry MacDonald <terry@soltra.com>; Mark Davidson <mdavidson@mitre.org>; Sean D. Barnum <sbarnum@mitre.org>; Jerome Athias <athiasjerome@gmail.com>; Taylor, Marlon <Marlon.Taylor@hq.dhs.gov>; cti-stix@lists.oasis-open.org
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0


     
    Lets run the FW use case to the ground, since most everyone should understand it...

     


     


    FW 1 see a series of weaponized PDFs come down.  Say it sees the same Weaponized PDF 2,000 times over a period of 3 days.  A large phishing attack with a lot of click happy users. 


     


    1) Now it is highly unlikely with the current model that the FW will remember and use the same ID value (UUID) for each Indicator+Observable+MAEC data blob it issues for this Weaponized PDF.  In fact, it will probably have 2,000 different
    UUID IDs for the same Indicator. 


     


    2) Now when you compound this by 60,000 client in the network issuing Sightings, this becomes to blow up quickly.


     


    Maybe... Just maybe....  The FW could take the JSON Indicator that it is going to issue and hash the data blob and use that hash as the ID.  Then at least each FW that is running the same code and is seeing basically the same thing with
    the same amount of data-enrichment, will issue the same ID value.  


     


    We will have a totally different problem in TAXII Land in the Query REST API.  Because you will probably want to do something like:


     


    /t2/query/indicator/file_name/FreeFood.pdf 


    or


    /t2/query/indicator/file_hash/<some file hash of the PDF>


     









     


    Thanks,


     


    Bret



     


     


     



    Bret Jordan CISSP

    Director of Security Architecture and Standards Office of the CTO


    Blue Coat Systems



    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050


    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." 









     



    On Oct 30, 2015, at 11:42, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:

     


    So then the question becomes - if the consumers are not using the IDs, then why are they required...
    " That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone
    will do or support that (a firewall generating millions of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. "

    I am against a mandatory 32 or 64 or whatever bytes in every sighting message if usually the bytes don't have any meaning behind them.


    And to again re-iterate - this problem is beyond sightings... it certainly exists for many classes of observables, and sometimes even indicators.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown






     







  • 17.  RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 11-03-2015 13:50
    > Um, why do we want the same ID? If the attacker has sent our Org the same pdf 2000 times then don’t we want to record that fact, and link the Sighting objects (with Observable Instances) to the Incident object with 2000 relationship objects? Then > don’t we want to also send that group of Incident, Sightings, Observables and Relationships to others in our Threat Sharing group so that they are aware of them? That is accurate. I am going to humbly suggest that there is no way any large organization has the resources to do what you are suggesting (record unique sighting objects in the graph for every occurrence of an indicator). I could easily have tens of thousands or more sightings of a single indicator in 1 day alone in real-world situations... extrapolate that out to millions of indicators monitored and months of data and you will see how this would impact your graph. Why would I want unique records of all of those sightings, to what purpose is it serving? What people care about in a sighting is a count of indicators, so that they can give increased significance to those that are currently "live". IE - the way I see things happening in most all implementations is the sighting will be ingested, it will be used to increment some counts, and it will then be discarded. I can't possibly see any implementation storing raw sightings, at least not at an enterprise scale, unless it has some arbitrary cap like "store raw sightings for 24 hours and then discard" - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown Terry MacDonald ---2015/10/30 07:32:02 PM---Um, why do we want the same ID? If the attacker has sent our Org the same pdf 2000 times then don’t From: Terry MacDonald <terry@soltra.com> To: "Jordan, Bret" <bret.jordan@bluecoat.com>, Jason Keirstead/CanEast/IBM@IBMCA Cc: "Wunder, John A." <jwunder@mitre.org>, Mark Davidson <mdavidson@mitre.org>, "Sean D. Barnum" <sbarnum@mitre.org>, Jerome Athias <athiasjerome@gmail.com>, "Taylor, Marlon" <Marlon.Taylor@hq.dhs.gov>, "cti-stix@lists.oasis-open.org" <cti-stix@lists.oasis-open.org> Date: 2015/10/30 07:32 PM Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Um, why do we want the same ID? If the attacker has sent our Org the same pdf 2000 times then don’t we want to record that fact, and link the Sighting objects (with Observable Instances) to the Incident object with 2000 relationship objects? Then don’t we want to also send that group of Incident, Sightings, Observables and Relationships to others in our Threat Sharing group so that they are aware of them? That is accurate. If we are worried about the size of storing the PDF multiple times, then it is up to the implementation to recognize that the MD5 of the attachment item is the same and then actually only store it once (just like MS Exchange servers have been doing since mid-2000’s). How do we identify to others that the above data came from us? If the ID of the object just generated from the <HashofContent> then there is no easy way to do this. If the ID of the object generated from the namespace.<HashofContent> then we have more chance. But what happens if we decide to update the Incident? The ID is now namespace.<NewHashofContent>. Now how do we de-duplicate? Do we now have to puclish a relationship object explicitly stating the is a replacement object for the namespace.<HashofContent> object? And what about relationship objects? Part of the power of separate top-level objects is that we can now just tell people about the relationship, but we can keep the actual data node it refers to a secret. Therefore in some implementations the only link to tie relationships together is the fact both relationships share an ID: e.g RelationshipA (src: CampaignA -> Threat ActorA) RelationshipB (src: IndicatorA -> CampaignA) RelationshipC (src: IndicatorB -> CampaignA) The recipient may not have the CampaignA data or ThreatActorA data, but they will still know that the IndicatorA and IndicatorB are related to the same campaign thanks to the relationship contains in the same IDs. This completely breaks if the ID’s change over time. We need an ID solution that: - Includes the domain namespace in the ID so that recipients know where to ask for more information. - The ID stays the same over the lifetime of the object even if it is updated and the content changes. - Recognizes that IDs will be coming from many different companies and many different sources and that we ned a way of easily understanding who produced the data. To go over the FW use case again 1. FW 1 see a series of weaponized PDFs come down through email. For each weaponized PDF email it detects, it creates a detection alert and sends that to its FW mgmt server. 2. The FW mgmt. server has STIX/TAXII capabilities. For the first detection alert that the FW MGMT receives, it creates a STIX v2 Sighting object, and a corresponding STIX Observable containing a CybOX EmailMessage Object and a related File object, and two relationship objects to join the STIX Sighting to the Observables. It stores a mapping of the Observable SHA256 / file ID in a local internal data table for the EmailMessage and the File. It sends these out on the TAXII channel that it was configured to use. 3. The main TAXII repository receives this STIX v2 Sighting object and the corresponding STIX Observable containing a CybOX an EmailMessage Object and a related File object, and adds them to its repository. 4. For the second detection alert that the FW MGMT receives, it does a SHA256 hash of the Email contents and the attached File independently to see if it’s seen them before. It hasn’t seen the EmailMessage before, but it has seen the attached PDF. 5. it creates a STIX v2 Sighting object, and a corresponding STIX Observable containing a new CybOX EmailMessage Object (email address was different). The EmailMessage contains the idref of the previously generated File object. It also adds two relationship objects to join the new STIX Sighting to the Observables. It sends these out on the TAXII channel that it was configured to use. 6. The main TAXII repository receives this second detection STIX v2 content, and adds them to its repository. 7. The next detection alerts each will create a new Sighting object, new EmailMessage object but will refer to the same File object. Relationships will be created between these objects as well. At this point, the main taxi repo knows that the File objects are all related. Cheers Terry MacDonald Senior STIX Subject Matter Expert SOLTRA An FS-ISAC and DTCC Company +61 (407) 203 206 terry@soltra.com From: Jordan, Bret [ mailto:bret.jordan@bluecoat.com ] Sent: Saturday, 31 October 2015 4:54 AM To: Jason Keirstead <Jason.Keirstead@ca.ibm.com> Cc: Wunder, John A. <jwunder@mitre.org>; Terry MacDonald <terry@soltra.com>; Mark Davidson <mdavidson@mitre.org>; Sean D. Barnum <sbarnum@mitre.org>; Jerome Athias <athiasjerome@gmail.com>; Taylor, Marlon <Marlon.Taylor@hq.dhs.gov>; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Lets run the FW use case to the ground, since most everyone should understand it... FW 1 see a series of weaponized PDFs come down. Say it sees the same Weaponized PDF 2,000 times over a period of 3 days. A large phishing attack with a lot of click happy users. 1) Now it is highly unlikely with the current model that the FW will remember and use the same ID value (UUID) for each Indicator+Observable+MAEC data blob it issues for this Weaponized PDF. In fact, it will probably have 2,000 different UUID IDs for the same Indicator. 2) Now when you compound this by 60,000 client in the network issuing Sightings, this becomes to blow up quickly. Maybe... Just maybe.... The FW could take the JSON Indicator that it is going to issue and hash the data blob and use that hash as the ID. Then at least each FW that is running the same code and is seeing basically the same thing with the same amount of data-enrichment, will issue the same ID value. We will have a totally different problem in TAXII Land in the Query REST API. Because you will probably want to do something like: /t2/query/indicator/file_name/FreeFood.pdf or /t2/query/indicator/file_hash/<some file hash of the PDF> Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." On Oct 30, 2015, at 11:42, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: So then the question becomes - if the consumers are not using the IDs, then why are they required... " That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. " I am against a mandatory 32 or 64 or whatever bytes in every sighting message if usually the bytes don't have any meaning behind them. And to again re-iterate - this problem is beyond sightings... it certainly exists for many classes of observables, and sometimes even indicators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown




  • 18.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 11-03-2015 15:11
    We should have to clarify the difference(s) between  Sighting (and with it Observation) Number of Occurrences (or Counts) Then yes. One would probably keep this total number, e.g. To characterize a Campaign, but would probably not keep for lifetime details of "each instances" (e.g. Log retention period) On Tuesday, 3 November 2015, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: > Um, why do we want the same ID? If the attacker has sent our Org the same pdf 2000 times then don’t we want to record that fact, and link the Sighting objects (with Observable Instances) to the Incident object with 2000 relationship objects? Then > don’t we want to also send that group of Incident, Sightings, Observables and Relationships to others in our Threat Sharing group so that they are aware of them? That is accurate. I am going to humbly suggest that there is no way any large organization has the resources to do what you are suggesting (record unique sighting objects in the graph for every occurrence of an indicator). I could easily have tens of thousands or more sightings of a single indicator in 1 day alone in real-world situations... extrapolate that out to millions of indicators monitored and months of data and you will see how this would impact your graph. Why would I want unique records of all of those sightings, to what purpose is it serving? What people care about in a sighting is a count of indicators, so that they can give increased significance to those that are currently "live". IE - the way I see things happening in most all implementations is the sighting will be ingested, it will be used to increment some counts, and it will then be discarded. I can't possibly see any implementation storing raw sightings, at least not at an enterprise scale, unless it has some arbitrary cap like "store raw sightings for 24 hours and then discard" - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown Terry MacDonald ---2015/10/30 07:32:02 PM---Um, why do we want the same ID? If the attacker has sent our Org the same pdf 2000 times then don’t From: Terry MacDonald < terry@soltra.com > To: "Jordan, Bret" < bret.jordan@bluecoat.com >, Jason Keirstead/CanEast/IBM@IBMCA Cc: "Wunder, John A." < jwunder@mitre.org >, Mark Davidson < mdavidson@mitre.org >, "Sean D. Barnum" < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Date: 2015/10/30 07:32 PM Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Um, why do we want the same ID? If the attacker has sent our Org the same pdf 2000 times then don’t we want to record that fact, and link the Sighting objects (with Observable Instances) to the Incident object with 2000 relationship objects? Then don’t we want to also send that group of Incident, Sightings, Observables and Relationships to others in our Threat Sharing group so that they are aware of them? That is accurate. If we are worried about the size of storing the PDF multiple times, then it is up to the implementation to recognize that the MD5 of the attachment item is the same and then actually only store it once (just like MS Exchange servers have been doing since mid-2000’s). How do we identify to others that the above data came from us? If the ID of the object just generated from the <HashofContent> then there is no easy way to do this. If the ID of the object generated from the namespace.<HashofContent> then we have more chance. But what happens if we decide to update the Incident? The ID is now namespace.<NewHashofContent>. Now how do we de-duplicate? Do we now have to puclish a relationship object explicitly stating the is a replacement object for the namespace.<HashofContent> object? And what about relationship objects? Part of the power of separate top-level objects is that we can now just tell people about the relationship, but we can keep the actual data node it refers to a secret. Therefore in some implementations the only link to tie relationships together is the fact both relationships share an ID: e.g RelationshipA (src: CampaignA -> Threat ActorA) RelationshipB (src: IndicatorA -> CampaignA) RelationshipC (src: IndicatorB -> CampaignA) The recipient may not have the CampaignA data or ThreatActorA data, but they will still know that the IndicatorA and IndicatorB are related to the same campaign thanks to the relationship contains in the same IDs. This completely breaks if the ID’s change over time. We need an ID solution that: - Includes the domain namespace in the ID so that recipients know where to ask for more information. - The ID stays the same over the lifetime of the object even if it is updated and the content changes. - Recognizes that IDs will be coming from many different companies and many different sources and that we ned a way of easily understanding who produced the data. To go over the FW use case again 1. FW 1 see a series of weaponized PDFs come down through email. For each weaponized PDF email it detects, it creates a detection alert and sends that to its FW mgmt server. 2. The FW mgmt. server has STIX/TAXII capabilities. For the first detection alert that the FW MGMT receives, it creates a STIX v2 Sighting object, and a corresponding STIX Observable containing a CybOX EmailMessage Object and a related File object, and two relationship objects to join the STIX Sighting to the Observables. It stores a mapping of the Observable SHA256 / file ID in a local internal data table for the EmailMessage and the File. It sends these out on the TAXII channel that it was configured to use. 3. The main TAXII repository receives this STIX v2 Sighting object and the corresponding STIX Observable containing a CybOX an EmailMessage Object and a related File object, and adds them to its repository. 4. For the second detection alert that the FW MGMT receives, it does a SHA256 hash of the Email contents and the attached File independently to see if it’s seen them before. It hasn’t seen the EmailMessage before, but it has seen the attached PDF. 5. it creates a STIX v2 Sighting object, and a corresponding STIX Observable containing a new CybOX EmailMessage Object (email address was different). The EmailMessage contains the idref of the previously generated File object. It also adds two relationship objects to join the new STIX Sighting to the Observables. It sends these out on the TAXII channel that it was configured to use. 6. The main TAXII repository receives this second detection STIX v2 content, and adds them to its repository. 7. The next detection alerts each will create a new Sighting object, new EmailMessage object but will refer to the same File object. Relationships will be created between these objects as well. At this point, the main taxi repo knows that the File objects are all related. Cheers Terry MacDonald Senior STIX Subject Matter Expert SOLTRA An FS-ISAC and DTCC Company +61 (407) 203 206 terry@soltra.com From: Jordan, Bret [ mailto:bret.jordan@bluecoat.com ] Sent: Saturday, 31 October 2015 4:54 AM To: Jason Keirstead < Jason.Keirstead@ca.ibm.com > Cc: Wunder, John A. < jwunder@mitre.org >; Terry MacDonald < terry@soltra.com >; Mark Davidson < mdavidson@mitre.org >; Sean D. Barnum < sbarnum@mitre.org >; Jerome Athias < athiasjerome@gmail.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Lets run the FW use case to the ground, since most everyone should understand it... FW 1 see a series of weaponized PDFs come down. Say it sees the same Weaponized PDF 2,000 times over a period of 3 days. A large phishing attack with a lot of click happy users. 1) Now it is highly unlikely with the current model that the FW will remember and use the same ID value (UUID) for each Indicator+Observable+MAEC data blob it issues for this Weaponized PDF. In fact, it will probably have 2,000 different UUID IDs for the same Indicator. 2) Now when you compound this by 60,000 client in the network issuing Sightings, this becomes to blow up quickly. Maybe... Just maybe.... The FW could take the JSON Indicator that it is going to issue and hash the data blob and use that hash as the ID. Then at least each FW that is running the same code and is seeing basically the same thing with the same amount of data-enrichment, will issue the same ID value. We will have a totally different problem in TAXII Land in the Query REST API. Because you will probably want to do something like: /t2/query/indicator/file_name/FreeFood.pdf or /t2/query/indicator/file_hash/<some file hash of the PDF> Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." On Oct 30, 2015, at 11:42, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: So then the question becomes - if the consumers are not using the IDs, then why are they required... " That said, that doesn’t mean sightings shouldn’t have IDs. If I autogen IDs for sightings then you can delete them, revoke them, ask for more info about them, etc. Maybe not everyone will do or support that (a firewall generating millions of sightings won’t persist the ID, but the threat intel tool working human-to-human sightings might) but by having an ID we can at least support it. " I am against a mandatory 32 or 64 or whatever bytes in every sighting message if usually the bytes don't have any meaning behind them. And to again re-iterate - this problem is beyond sightings... it certainly exists for many classes of observables, and sometimes even indicators. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown


  • 19.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 17:28




    Just jumping in here, but it sounds to me like this is calling out for some kind of Observable hashing function. If we can algorithmically ensure some unique output for a particular Observable input, that can effectively be used in place of an Observable
    ID and referenced in sightings and elsewhere.


    Regards,
    Ivan








    From: < cti-stix@lists.oasis-open.org > on behalf of Jason Keirstead
    Date: Friday, October 30, 2015 at 12:51 PM
    To: Bret Jordan
    Cc: Terry MacDonald, Mark Davidson, Sean Barnum, Jerome Athias, Marlon Taylor, John Wunder, " cti-stix@lists.oasis-open.org "
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0





    So here is my question.


    " Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel.
    "

    How is that firewall going to generate and persist that observable ID to be re-referenced by the "light bulb sighting"? Because if he sees the same "something bad" 1 minute, hour, or day later, he should be sending the same observable ID - otherwise, the sightings
    numbers would all be reset every time he sees it.

    IE - the problem I describe extends beyond sightings, it also extends to observables and even indicators. Most producers of this information won't have the ways and means to build a giant database (of ie. all of the IP addresses they have ever seen) so that
    they know they will re-use the same ID if they want to re-emit an observable. As such if they want an ID that can be re-referenceable, they will have to generate an ID based on the current data, since the current data is all they have to go on.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    "Jordan,
    Bret" ---2015/10/30 12:36:36 PM---Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me expla

    From: "Jordan, Bret" < bret.jordan@bluecoat.com >
    To: Jason Keirstead/CanEast/IBM@IBMCA
    Cc: Terry MacDonald < terry@soltra.com >, Mark Davidson < mdavidson@mitre.org >, "Sean D. Barnum" < sbarnum@mitre.org >,
    Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org "
    < cti-stix@lists.oasis-open.org >
    Date: 2015/10/30 12:36 PM
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >




    Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me explain how I see the workflow going....


    Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. All of the end point devices (clients, phones, printers, ip enabled light bulbs) can see that indicator and respond with a sighting if
    the so desire.

    The sighting will have an IDREF or similar back to the objects it is referencing. Now the original client or a message handler running on the TAXII server (if the TAXII server is a broker + query repo) could pick up and aggregate all of the sightings
    coming back for that original observable and either store it or do something with it. In the TAXII server case (broker + repo) it might store the data in a database or bubble it up to an analyst for review before sending it out a different channel group.




    Thanks,

    Bret



    Bret Jordan CISSP
    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."



    On Oct 30, 2015, at 06:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:
    I know historically I have been pushing for an RFC-Compliant UUID as mandatory component of this - now i am going to backtrack on my previous argument :)

    I actually think that having a UUID be mandatory is not workable, and here is why: For many (most?) products looking to produce observable and sightings, there is no system-wide "ID" in their product that could be used to represent something like an observable.
    Similarly, STIX producers like embedded devices and endpoints, do not have the resources or processing capacity to start storing these relationships. As such, said producers have two options for generating sightings:




    a) Have a randomly-generated UUID (which is of no use to anyone in the end because it will remove all traceability and create rampant data duplication)

    b) Have an algorithmically derived ID based on the data (IE, any time I issue an observable for Equals 1.2.3.4, the same ID will be derived)


    (b) Is really the only workable ID mechanism for most products.

    I have recently started to run into this in practice in my own product work, so I know it is a real problem that is going to hit a lot of people if we start mandating IDs and UUIDs.


    Here is an assertion - why is ID even a mandatory field for a sighting? I am not sure why it is useful. If a STIX repository needs an ID for an internal record, it can generate its own in any way it wants. I am not sure why a producer needs to specify an ID.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> Terry MacDonald ---2015/10/29 06:51:35 PM---Mark, That should change with the top-level relationship object. It will be quite possible to send j

    From: Terry MacDonald < terry@soltra.com >
    To: "Davidson II, Mark S" < mdavidson@mitre.org >, "Jordan, Bret" < bret.jordan@bluecoat.com >,
    "Barnum, Sean D." < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >,
    "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Date: 2015/10/29 06:51 PM
    Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >





    Mark,

    That should change with the top-level relationship object. It will be quite possible to send just a relationship object in a package. This will mean that the consumer will need the ability to contact the original producer of the reference STIX data object to
    ask if they are allowed the full object rather than just the reference to it. Having the ability to find the TAXII server from just the STIX object ID is critical to allow this to happen.

    This functionality also allows more secretive providers to ‘hide’ their data, such that consumers can understand that relationships exist, but that only a small subset of approved consumers will have access to the actual STIX object data. It gives the ability
    to hide stuff.

    Cheers

    Terry MacDonald
    Senior STIX Subject Matter Expert
    SOLTRA An FS-ISAC and DTCC Company
    +61 (407) 203 206 terry@soltra.com


    From: Davidson II, Mark S [ mailto:mdavidson@mitre.org ]

    Sent: Friday, 30 October 2015 5:05 AM
    To: Jordan, Bret < bret.jordan@bluecoat.com >; Barnum, Sean D. < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >;
    Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >;
    cti-stix@lists.oasis-open.org
    Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    If want the ability to dereference arbitrary STIX IDs (for use in accessing some kind of repository, let’s say), then I think requiring a rule whereby STIX IDs can be turned into a URL could be a good requirement (Note: URLs as IDs would satisfy this requirement).
    While there is a concept for idref today, I personally haven’t seen an implementation that dereferences STIX IDs outside of the document containing the idref.

    Thank you.
    -Mark

    PS, a notional example: <stix:Indicator idref=” https://example.org/stix121/indicators/123 ”/>




    From:
    cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ]
    On Behalf Of Jordan, Bret
    Sent: Thursday, October 29, 2015 1:03 PM
    To: Barnum, Sean D. < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >;
    Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >;
    cti-stix@lists.oasis-open.org
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Let's just make sure we do not build an ID system that is so vast that it can enumerate every atom in the known universe.


    Bret

    Sent from my Commodore 64





    STIX SC Co-chair










    [attachment "signature.asc" deleted by Jason Keirstead/CanEast/IBM]











  • 20.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 17:37
    In fact, this is what I am writing in my own STIX 1.x code as we speak, since it is really the only way for me to proceed : However, the way I am doing it is very implementation specific and probably would be seen as "hackish", its certainly not a general-purpose observable hashing function. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown "Kirillov, Ivan A." ---2015/10/30 02:28:06 PM---Just jumping in here, but it sounds to me like this is calling out for some kind of Observable hashi From: "Kirillov, Ivan A." <ikirillov@mitre.org> To: Jason Keirstead/CanEast/IBM@IBMCA, "Jordan, Bret" <bret.jordan@bluecoat.com> Cc: Terry MacDonald <terry@soltra.com>, "Davidson II, Mark S" <mdavidson@mitre.org>, "Barnum, Sean D." <sbarnum@mitre.org>, Jerome Athias <athiasjerome@gmail.com>, "Taylor, Marlon" <Marlon.Taylor@hq.dhs.gov>, "Wunder, John A." <jwunder@mitre.org>, "cti-stix@lists.oasis-open.org" <cti-stix@lists.oasis-open.org> Date: 2015/10/30 02:28 PM Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Just jumping in here, but it sounds to me like this is calling out for some kind of Observable hashing function. If we can algorithmically ensure some unique output for a particular Observable input, that can effectively be used in place of an Observable ID and referenced in sightings and elsewhere. Regards, Ivan From: < cti-stix@lists.oasis-open.org > on behalf of Jason Keirstead Date: Friday, October 30, 2015 at 12:51 PM To: Bret Jordan Cc: Terry MacDonald, Mark Davidson, Sean Barnum, Jerome Athias, Marlon Taylor, John Wunder, " cti-stix@lists.oasis-open.org " Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    So here is my question. " Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. " How is that firewall going to generate and persist that observable ID to be re-referenced by the "light bulb sighting"? Because if he sees the same "something bad" 1 minute, hour, or day later, he should be sending the same observable ID - otherwise, the sightings numbers would all be reset every time he sees it. IE - the problem I describe extends beyond sightings, it also extends to observables and even indicators. Most producers of this information won't have the ways and means to build a giant database (of ie. all of the IP addresses they have ever seen) so that they know they will re-use the same ID if they want to re-emit an observable. As such if they want an ID that can be re-referenceable, they will have to generate an ID based on the current data, since the current data is all they have to go on. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown "Jordan, Bret" ---2015/10/30 12:36:36 PM---Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me expla From: "Jordan, Bret" < bret.jordan@bluecoat.com > To: Jason Keirstead/CanEast/IBM@IBMCA Cc: Terry MacDonald < terry@soltra.com >, Mark Davidson < mdavidson@mitre.org >, "Sean D. Barnum" < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Date: 2015/10/30 12:36 PM Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me explain how I see the workflow going.... Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. All of the end point devices (clients, phones, printers, ip enabled light bulbs) can see that indicator and respond with a sighting if the so desire. The sighting will have an IDREF or similar back to the objects it is referencing. Now the original client or a message handler running on the TAXII server (if the TAXII server is a broker + query repo) could pick up and aggregate all of the sightings coming back for that original observable and either store it or do something with it. In the TAXII server case (broker + repo) it might store the data in a database or bubble it up to an analyst for review before sending it out a different channel group. Thanks, Bret Bret Jordan CISSP Director of Security Architecture and Standards Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg." On Oct 30, 2015, at 06:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: I know historically I have been pushing for an RFC-Compliant UUID as mandatory component of this - now i am going to backtrack on my previous argument :) I actually think that having a UUID be mandatory is not workable, and here is why: For many (most?) products looking to produce observable and sightings, there is no system-wide "ID" in their product that could be used to represent something like an observable. Similarly, STIX producers like embedded devices and endpoints, do not have the resources or processing capacity to start storing these relationships. As such, said producers have two options for generating sightings: a) Have a randomly-generated UUID (which is of no use to anyone in the end because it will remove all traceability and create rampant data duplication) b) Have an algorithmically derived ID based on the data (IE, any time I issue an observable for Equals 1.2.3.4, the same ID will be derived) (b) Is really the only workable ID mechanism for most products. I have recently started to run into this in practice in my own product work, so I know it is a real problem that is going to hit a lot of people if we start mandating IDs and UUIDs. Here is an assertion - why is ID even a mandatory field for a sighting? I am not sure why it is useful. If a STIX repository needs an ID for an internal record, it can generate its own in any way it wants. I am not sure why a producer needs to specify an ID. - Jason Keirstead Product Architect, Security Intelligence, IBM Security Systems www.ibm.com/security www.securityintelligence.com Without data, all you are is just another person with an opinion - Unknown <graycol.gif> Terry MacDonald ---2015/10/29 06:51:35 PM---Mark, That should change with the top-level relationship object. It will be quite possible to send j From: Terry MacDonald < terry@soltra.com > To: "Davidson II, Mark S" < mdavidson@mitre.org >, "Jordan, Bret" < bret.jordan@bluecoat.com >, "Barnum, Sean D." < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org > Date: 2015/10/29 06:51 PM Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Sent by: < cti-stix@lists.oasis-open.org > Mark, That should change with the top-level relationship object. It will be quite possible to send just a relationship object in a package. This will mean that the consumer will need the ability to contact the original producer of the reference STIX data object to ask if they are allowed the full object rather than just the reference to it. Having the ability to find the TAXII server from just the STIX object ID is critical to allow this to happen. This functionality also allows more secretive providers to ‘hide’ their data, such that consumers can understand that relationships exist, but that only a small subset of approved consumers will have access to the actual STIX object data. It gives the ability to hide stuff. Cheers Terry MacDonald Senior STIX Subject Matter Expert SOLTRA An FS-ISAC and DTCC Company +61 (407) 203 206 terry@soltra.com From: Davidson II, Mark S [ mailto:mdavidson@mitre.org ] Sent: Friday, 30 October 2015 5:05 AM To: Jordan, Bret < bret.jordan@bluecoat.com >; Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >; cti-stix@lists.oasis-open.org Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 If want the ability to dereference arbitrary STIX IDs (for use in accessing some kind of repository, let’s say), then I think requiring a rule whereby STIX IDs can be turned into a URL could be a good requirement (Note: URLs as IDs would satisfy this requirement). While there is a concept for idref today, I personally haven’t seen an implementation that dereferences STIX IDs outside of the document containing the idref. Thank you. -Mark PS, a notional example: <stix:Indicator idref=” https://example.org/stix121/indicators/123 ”/> From: cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ] On Behalf Of Jordan, Bret Sent: Thursday, October 29, 2015 1:03 PM To: Barnum, Sean D. < sbarnum@mitre.org > Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >; Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >; cti-stix@lists.oasis-open.org Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0 Let's just make sure we do not build an ID system that is so vast that it can enumerate every atom in the known universe. Bret Sent from my Commodore 64 STIX SC Co-chair [attachment "signature.asc" deleted by Jason Keirstead/CanEast/IBM] [attachment "graycol.gif" deleted by Jason Keirstead/CanEast/IBM]




  • 21.  Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Posted 10-30-2015 17:42





    Yeah, we ended up doing something very similar in some of the python-maec comparator code [1], also rather hackish. If we as the community feel that this is a viable approach as a whole, perhaps we should consider having a formal Observable hashing specification
    (maybe as a CybOX SC work product)?


    [1]  https://github.com/MAECProject/python-maec/blob/master/maec/utils/comparator.py#L126-L146


    Regards,
    Ivan









    From: < cti-stix@lists.oasis-open.org > on behalf of Jason Keirstead
    Date: Friday, October 30, 2015 at 1:36 PM
    To: Ivan Kirillov
    Cc: Jerome Athias, Bret Jordan, " cti-stix@lists.oasis-open.org ", John Wunder, Marlon Taylor, Mark Davidson, Sean Barnum, Terry MacDonald
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0





    In fact, this is what I am writing in my own STIX 1.x code as we speak, since it is really the only way for me to proceed :

    However, the way I am doing it is very implementation specific and probably would be seen as "hackish", its certainly not a general-purpose observable hashing function.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    "Kirillov,
    Ivan A." ---2015/10/30 02:28:06 PM---Just jumping in here, but it sounds to me like this is calling out for some kind of Observable hashi

    From: "Kirillov, Ivan A." < ikirillov@mitre.org >
    To: Jason Keirstead/CanEast/IBM@IBMCA, "Jordan, Bret" < bret.jordan@bluecoat.com >
    Cc: Terry MacDonald < terry@soltra.com >, "Davidson II, Mark S" < mdavidson@mitre.org >, "Barnum, Sean D." < sbarnum@mitre.org >,
    Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org "
    < cti-stix@lists.oasis-open.org >
    Date: 2015/10/30 02:28 PM
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0





    Just jumping in here, but it sounds to me like this is calling out for some kind of Observable hashing function. If we can algorithmically ensure some unique output for a particular Observable input, that can effectively be used in place
    of an Observable ID and referenced in sightings and elsewhere.

    Regards,
    Ivan

    From: < cti-stix@lists.oasis-open.org >
    on behalf of Jason Keirstead
    Date: Friday, October 30, 2015 at 12:51 PM
    To: Bret Jordan
    Cc: Terry MacDonald, Mark Davidson, Sean Barnum, Jerome Athias, Marlon Taylor, John Wunder, " cti-stix@lists.oasis-open.org "
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    So here is my question.


    " Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel.
    "


    How is that firewall going to generate and persist that observable ID to be re-referenced by the "light bulb sighting"? Because if he sees the same "something bad" 1 minute, hour, or day later, he should be sending the same observable ID - otherwise, the sightings
    numbers would all be reset every time he sees it.

    IE - the problem I describe extends beyond sightings, it also extends to observables and even indicators. Most producers of this information won't have the ways and means to build a giant database (of ie. all of the IP addresses they have ever seen) so that
    they know they will re-use the same ID if they want to re-emit an observable. As such if they want an ID that can be re-referenceable, they will have to generate an ID based on the current data, since the current data is all they have to go on.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    "Jordan,
    Bret" ---2015/10/30 12:36:36 PM---Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me expla

    From: "Jordan, Bret" < bret.jordan@bluecoat.com >
    To: Jason Keirstead/CanEast/IBM@IBMCA
    Cc: Terry MacDonald < terry@soltra.com >, Mark Davidson < mdavidson@mitre.org >,
    "Sean D. Barnum" < sbarnum@mitre.org >, Jerome Athias < athiasjerome@gmail.com >,
    "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >, "Wunder, John A." < jwunder@mitre.org >,
    " cti-stix@lists.oasis-open.org " < cti-stix@lists.oasis-open.org >
    Date: 2015/10/30 12:36 PM
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >





    Thanks for catching this Jason. For sightings I am not sure why you would do an ID... Let me explain how I see the workflow going....


    Firewall sees something bad.. The firewall generates an observable and emits that on to a TAXII 2.0 channel. All of the end point devices (clients, phones, printers, ip enabled light bulbs) can see that indicator and respond with a sighting if the so desire.

    The sighting will have an IDREF or similar back to the objects it is referencing. Now the original client or a message handler running on the TAXII server (if the TAXII server is a broker + query repo) could pick up and aggregate all of the sightings coming
    back for that original observable and either store it or do something with it. In the TAXII server case (broker + repo) it might store the data in a database or bubble it up to an analyst for review before sending it out a different channel group.




    Thanks,

    Bret



    Bret Jordan CISSP
    Director of Security Architecture and Standards Office of the CTO
    Blue Coat Systems
    PGP Fingerprint: 63B4 FC53 680A 6B7D 1447 F2C0 74F8 ACAE 7415 0050
    "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."





    On Oct 30, 2015, at 06:30, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:
    I know historically I have been pushing for an RFC-Compliant UUID as mandatory component of this - now i am going to backtrack on my previous argument :)

    I actually think that having a UUID be mandatory is not workable, and here is why: For many (most?) products looking to produce observable and sightings, there is no system-wide "ID" in their product that could be used to represent something like an observable.
    Similarly, STIX producers like embedded devices and endpoints, do not have the resources or processing capacity to start storing these relationships. As such, said producers have two options for generating sightings:






    a) Have a randomly-generated UUID (which is of no use to anyone in the end because it will remove all traceability and create rampant data duplication)

    b) Have an algorithmically derived ID based on the data (IE, any time I issue an observable for Equals 1.2.3.4, the same ID will be derived)




    (b) Is really the only workable ID mechanism for most products.

    I have recently started to run into this in practice in my own product work, so I know it is a real problem that is going to hit a lot of people if we start mandating IDs and UUIDs.


    Here is an assertion - why is ID even a mandatory field for a sighting? I am not sure why it is useful. If a STIX repository needs an ID for an internal record, it can generate its own in any way it wants. I am not sure why a producer needs to specify an ID.

    -
    Jason Keirstead
    Product Architect, Security Intelligence, IBM Security Systems
    www.ibm.com/security
    www.securityintelligence.com

    Without data, all you are is just another person with an opinion - Unknown


    <graycol.gif> Terry MacDonald ---2015/10/29 06:51:35 PM---Mark, That should change with the top-level relationship object. It will be quite possible to send j

    From: Terry MacDonald < terry@soltra.com >
    To: "Davidson II, Mark S" < mdavidson@mitre.org >, "Jordan, Bret" < bret.jordan@bluecoat.com >,
    "Barnum, Sean D." < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >, "Taylor, Marlon" < Marlon.Taylor@hq.dhs.gov >,
    "Wunder, John A." < jwunder@mitre.org >, " cti-stix@lists.oasis-open.org "
    < cti-stix@lists.oasis-open.org >
    Date: 2015/10/29 06:51 PM
    Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0
    Sent by: < cti-stix@lists.oasis-open.org >





    Mark,

    That should change with the top-level relationship object. It will be quite possible to send just a relationship object in a package. This will mean that the consumer will need the ability to contact the original producer of the reference STIX data object to
    ask if they are allowed the full object rather than just the reference to it. Having the ability to find the TAXII server from just the STIX object ID is critical to allow this to happen.

    This functionality also allows more secretive providers to ‘hide’ their data, such that consumers can understand that relationships exist, but that only a small subset of approved consumers will have access to the actual STIX object data. It gives the ability
    to hide stuff.

    Cheers

    Terry MacDonald
    Senior STIX Subject Matter Expert
    SOLTRA An FS-ISAC and DTCC Company
    +61 (407) 203 206 terry@soltra.com


    From: Davidson II, Mark S [ mailto:mdavidson@mitre.org ]

    Sent: Friday, 30 October 2015 5:05 AM
    To: Jordan, Bret < bret.jordan@bluecoat.com >; Barnum, Sean D. < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >;
    Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >;
    cti-stix@lists.oasis-open.org
    Subject: RE: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    If want the ability to dereference arbitrary STIX IDs (for use in accessing some kind of repository, let’s say), then I think requiring a rule whereby STIX IDs can be turned into a URL could be a good requirement (Note: URLs as IDs would satisfy this requirement).
    While there is a concept for idref today, I personally haven’t seen an implementation that dereferences STIX IDs outside of the document containing the idref.

    Thank you.
    -Mark

    PS, a notional example: <stix:Indicator idref=” https://example.org/stix121/indicators/123 ”/>








    From:
    cti-stix@lists.oasis-open.org [ mailto:cti-stix@lists.oasis-open.org ]
    On Behalf Of Jordan, Bret
    Sent: Thursday, October 29, 2015 1:03 PM
    To: Barnum, Sean D. < sbarnum@mitre.org >
    Cc: Jerome Athias < athiasjerome@gmail.com >; Terry MacDonald < terry@soltra.com >;
    Taylor, Marlon < Marlon.Taylor@hq.dhs.gov >; Wunder, John A. < jwunder@mitre.org >;
    cti-stix@lists.oasis-open.org
    Subject: Re: [cti-stix] Proposal to establish Sightings (#306) and Relationships (#291) as our official issue topics under active consideration for STIX v2.0

    Let's just make sure we do not build an ID system that is so vast that it can enumerate every atom in the known universe.


    Bret

    Sent from my Commodore 64









    STIX SC Co-chair



















    [attachment "signature.asc" deleted by Jason Keirstead/CanEast/IBM]



    [attachment "graycol.gif" deleted by Jason Keirstead/CanEast/IBM]