OASIS Cyber Threat Intelligence (CTI) TC

 View Only
  • 1.  Re: [cti] How to model the object in this situation

    Posted 03-26-2021 18:22
      |   view attached




    Jason,
     
    We, at DarkLight, have also been working on the definition of a custom object to represent an asset , so we d definitely be interested in collaborating.  The use case/scenario you described is very common to the one which we re addressing,
    so we should find lots of common ground.  We ve looked at the definition of IT Asset as defined in
    NIST IR 7693 for inspiration as well.
     
     

    Paul Patrick
    EVP Engineering/interim Chief Product Officer
    DarkLight
     
    Mobile: (408) 465-6635
    Email:  Paul.Patrick@darklight.ai
     

     
    www.darklight.ai
     
    This e-mail (including any attachments) may contain information that is private, confidential, or protected by attorney-client or other privilege. If you received this e-mail in error, please delete it from
    your system without copying it and notify sender by reply e-mail so our records can be corrected.

     

     

    From:
    <cti@lists.oasis-open.org> on behalf of Jason Keirstead <Jason.Keirstead@ca.ibm.com>
    Date: Friday, March 26, 2021 at 1:29 PM
    To: "bj@ctin.us" <bj@ctin.us>
    Cc: "cti@lists.oasis-open.org" <cti@lists.oasis-open.org>, "jessie@nccst.nat.gov.tw" <jessie@nccst.nat.gov.tw>, "jg@ctin.us" <jg@ctin.us>, "Kelly.Cullinane@newcontext.com" <Kelly.Cullinane@newcontext.com>
    Subject: RE: [cti] How to model the object in this situation


     



    Just want to chime in here;


     


    There is currently no object in STIX to model "the asset", as in, the host/container/VM with the vulnerability. Its a use case that has been brought
    up a few times over the years, but never tackled.


     


    You can shoe-horn it in with an Indicator, but honestly IMO it is improper and weird to do this.


     


    "Infrastructure" SDO could maybe be embraced-and-extended, but it is very much designed for threat actor infrastructure, and has a very different set
    of information than what you would use to describe an asset.

    IBM and some others are working on this problem area via a custom object in STIX Shifter in the OCA because its a very important object & use case for us in a bunch of scenarios around posture management, as well as reporting back of findings using STIX. Once
    its more settled we would publish an extension with the proposal.


     


    We would love anyone who is interested in this use case to come over and collaborate with us on it. Currently what is there is basically a minimal stub
    used for a specific use case, and needs a lot more thought and fleshing out.  https://github.com/opencybersecurityalliance/stix-shifter  if you're interested.


     





    -
    Jason Keirstead
    Distinguished Engineer, CTO - IBM Security Threat Management
    www.ibm.com/security

    Co-Chair - Open Cybersecurity Alliance, Project Governing Board


    www.opencybersecurityalliance.org
     





     


     



    Attachment(s)

    tiff
    image001.png   235 KB 1 version


  • 2.  Re: [Non-DoD Source] Re: [cti] How to model the object in this situation

    Posted 03-27-2021 01:02
      |   view attached



    I'm personally partial to using Infrastructure in a more general sense for incident reporting, but that's typically because the reports we see don't describe specific systems by name and instead by general function.  In these cases Infrastructure works well since
    it seems like the fields will be largely identical and it could also function in a similar manner akin to a nested container.


    If you do want to get down to an abstraction of the more base level I agree that something like asset would be needed that could be part of the composition of an Infrastructure object.  I imagine for example it might be pretty useful if an org could end
    up creating a STIX map for their own internal assets identified by CPEs and then tied to Vulnerabilities.  If an Incident does occur you could then link it all together, or just use it to match against potential adversary actions from reporting feeds.



    I attached a rough stab at how this might integrate with an Incident proposal I shared a while back, and which we have been having a bit of back and forth internally at DC3 on to make sure I'm understanding it correctly.  I left the asset itself very bare
    bones for this, since I was mostly focused on the links, and don't want to step on the work that's being done now for the property mappings.



    Jeff Mates





    From: cti@lists.oasis-open.org <cti@lists.oasis-open.org> on behalf of Paul Patrick <ppatrick@darklight.ai>
    Sent: Friday, March 26, 2021 2:22 PM
    To: Jason Keirstead; bj@ctin.us
    Cc: cti@lists.oasis-open.org; jessie@nccst.nat.gov.tw; jg@ctin.us; Kelly.Cullinane@newcontext.com
    Subject: [Non-DoD Source] Re: [cti] How to model the object in this situation
     

    All active links contained in this email were disabled. Please verify the identity of the sender, and confirm the authenticity of all links contained within the message prior to copying and pasting the address to a Web browser.








    Jason,
     
    We, at DarkLight, have also been working on the definition of a custom object to represent an asset , so we d definitely be interested in collaborating.  The use case/scenario you described is very common to the one which we re addressing,
    so we should find lots of common ground.  We ve looked at the definition of IT Asset as defined inNIST IR 7693 < Caution-https://doi.org/10.6028/NIST.IR.7693 >  for inspiration as well.
     
     

    Paul Patrick
    EVP Engineering/interim Chief Product Officer
    DarkLight
     
    Mobile: (408) 465-6635
    Email:  Paul.Patrick@darklight.ai
     

     
    Caution-www.darklight.ai  < Caution-http://www.darklight.ai/ > 
     
    This e-mail (including any attachments) may contain information that is private, confidential, or protected by attorney-client or other privilege. If you received this e-mail in error, please delete it from
    your system without copying it and notify sender by reply e-mail so our records can be corrected.

     

     

    From: <cti@lists.oasis-open.org> on behalf of Jason Keirstead <Jason.Keirstead@ca.ibm.com>
    Date: Friday, March 26, 2021 at 1:29 PM
    To: "bj@ctin.us" <bj@ctin.us>
    Cc: "cti@lists.oasis-open.org" <cti@lists.oasis-open.org>, "jessie@nccst.nat.gov.tw" <jessie@nccst.nat.gov.tw>, "jg@ctin.us" <jg@ctin.us>, "Kelly.Cullinane@newcontext.com" <Kelly.Cullinane@newcontext.com>
    Subject: RE: [cti] How to model the object in this situation


     



    Just want to chime in here;


     


    There is currently no object in STIX to model "the asset", as in, the host/container/VM with the vulnerability. Its a use case that has been brought
    up a few times over the years, but never tackled.


     


    You can shoe-horn it in with an Indicator, but honestly IMO it is improper and weird to do this.


     


    "Infrastructure" SDO could maybe be embraced-and-extended, but it is very much designed for threat actor infrastructure, and has a very different set
    of information than what you would use to describe an asset.

    IBM and some others are working on this problem area via a custom object in STIX Shifter in the OCA because its a very important object & use case for us in a bunch of scenarios around posture management, as well as reporting back of findings using STIX. Once
    its more settled we would publish an extension with the proposal.


     


    We would love anyone who is interested in this use case to come over and collaborate with us on it. Currently what is there is basically a minimal stub
    used for a specific use case, and needs a lot more thought and fleshing out. Caution-https://github.com/opencybersecurityalliance/stix-shifter < Caution-https://github.com/opencybersecurityalliance/stix-shifter >  if you're interested.


     





    -
    Jason Keirstead
    Distinguished Engineer, CTO - IBM Security Threat Management
    Caution-www.ibm.com/security

    Co-Chair - Open Cybersecurity Alliance, Project Governing Board


    Caution-www.opencybersecurityalliance.org
     





     


     



    Attachment(s)

    tiff
    image001.png   235 KB 1 version


  • 3.  Re: [Non-DoD Source] [cti] How to model the object in this situation

    Posted 03-28-2021 03:30
    If there is enough interest in doing some of these things, then the TC should do them. That is the correct place for the work to be done. Then they can be released as standalone specs for that one object.  I know I have brought this up in the past, but post 2.1 I see the TC working on a series of objects that get released as standalone specs. Some objects may just be extensions. Some may be really informally published via Github or a website. Some may be released as a Committee Note.  Then over time (several years), once there is a bunch of these defined objects, the TC can then fold them all back into the main spec and release a version 2.2 or if there is enough changes, a 3.0. But the work on STIX and TAXII should be done in this TC. So if you have ideas for things or you are working on some objects, please start discussing them on the list and start fleshing them out. Then when you are ready I can help show you how to start an official document and submit it to the TC for a CSD ballot.   Bret On Mar 26, 2021, at 7:01 PM, Mates, Jeffrey CIV DC3/TSD < Jeffrey.Mates@dc3.mil > wrote: I'm personally partial to using Infrastructure in a more general sense for incident reporting, but that's typically because the reports we see don't describe specific systems by name and instead by general function.  In these cases Infrastructure works well since it seems like the fields will be largely identical and it could also function in a similar manner akin to a nested container. If you do want to get down to an abstraction of the more base level I agree that something like asset would be needed that could be part of the composition of an Infrastructure object.  I imagine for example it might be pretty useful if an org could end up creating a STIX map for their own internal assets identified by CPEs and then tied to Vulnerabilities.  If an Incident does occur you could then link it all together, or just use it to match against potential adversary actions from reporting feeds. I attached a rough stab at how this might integrate with an Incident proposal I shared a while back, and which we have been having a bit of back and forth internally at DC3 on to make sure I'm understanding it correctly.  I left the asset itself very bare bones for this, since I was mostly focused on the links, and don't want to step on the work that's being done now for the property mappings. Jeff Mates From:   cti@lists.oasis-open.org   < cti@lists.oasis-open.org > on behalf of Paul Patrick < ppatrick@darklight.ai > Sent:   Friday, March 26, 2021 2:22 PM To:   Jason Keirstead;   bj@ctin.us Cc:   cti@lists.oasis-open.org ;   jessie@nccst.nat.gov.tw ;   jg@ctin.us ;   Kelly.Cullinane@newcontext.com Subject:   [Non-DoD Source] Re: [cti] How to model the object in this situation   All active links contained in this email were disabled. Please verify the identity of the sender, and confirm the authenticity of all links contained within the message prior to copying and pasting the address to a Web browser.   Jason,   We, at DarkLight, have also been working on the definition of a custom object to represent an asset , so we d definitely be interested in collaborating.  The use case/scenario you described is very common to the one which we re addressing, so we should find lots of common ground.  We ve looked at the definition of IT Asset as defined inNIST IR 7693 <  Caution-https://doi.org/10.6028/NIST.IR.7693  >  for inspiration as well.     Paul Patrick EVP Engineering/interim Chief Product Officer DarkLight   Mobile: (408) 465-6635 Email:    Paul.Patrick@darklight.ai   <image001.png>   Caution- www.darklight.ai  <  Caution-http://www.darklight.ai/  >    This e-mail (including any attachments) may contain information that is private, confidential, or protected by attorney-client or other privilege. If you received this e-mail in error, please delete it from your system without copying it and notify sender by reply e-mail so our records can be corrected.     From: < cti@lists.oasis-open.org > on behalf of Jason Keirstead < Jason.Keirstead@ca.ibm.com > Date:   Friday, March 26, 2021 at 1:29 PM To:   bj@ctin.us < bj@ctin.us > Cc:   cti@lists.oasis-open.org < cti@lists.oasis-open.org >, jessie@nccst.nat.gov.tw < jessie@nccst.nat.gov.tw >, jg@ctin.us < jg@ctin.us >, Kelly.Cullinane@newcontext.com < Kelly.Cullinane@newcontext.com > Subject:   RE: [cti] How to model the object in this situation   Just want to chime in here;   There is currently no object in STIX to model the asset , as in, the host/container/VM with the vulnerability. Its a use case that has been brought up a few times over the years, but never tackled.   You can shoe-horn it in with an Indicator, but honestly IMO it is improper and weird to do this.   Infrastructure SDO could maybe be embraced-and-extended, but it is very much designed for threat actor infrastructure, and has a very different set of information than what you would use to describe an asset. IBM and some others are working on this problem area via a custom object in STIX Shifter in the OCA because its a very important object & use case for us in a bunch of scenarios around posture management, as well as reporting back of findings using STIX. Once its more settled we would publish an extension with the proposal.   We would love anyone who is interested in this use case to come over and collaborate with us on it. Currently what is there is basically a minimal stub used for a specific use case, and needs a lot more thought and fleshing out.  Caution-https://github.com/opencybersecurityalliance/stix-shifter  <  Caution-https://github.com/opencybersecurityalliance/stix-shifter  >  if you're interested.   - Jason Keirstead Distinguished Engineer, CTO - IBM Security Threat Management Caution-www.ibm.com/security Co-Chair - Open Cybersecurity Alliance, Project Governing Board Caution-www.opencybersecurityalliance.org      


  • 4.  Re: [cti] Re: [Non-DoD Source] [cti] How to model the object in this situation

    Posted 03-31-2021 13:56
      Back in 2017 when Infrastructure was created, non-attacker-infrastructure was a non-goal of the object           1) The primary goal is to document attacker infrastructure. Specifically where malware was delivered from and where it is beaconing to.          2) If other types of architecture can be documented, okay, but that is not our focus right now. We thus went in the direction of a custom object because Infrastructure does not have any of the data we are actually trying to model when one thinks of an asset, and is currently very attacker-focused (see infrastructure-type-ov vocabulary for example). As opposed to trying to get people to re-think what Infrastructure means, it seems cleaner to make a seperate object for this very different use case.    I am open to maybe extending infrastructure (I am open to anything at this point....) but we would have to consider the impact of that to users of it.   Our goal is to have proven working open source code and implementations. Once any issues are shaken out with those the extension could certainly be taken up by the TC if it wanted to do that.   - Jason Keirstead Distinguished Engineer, CTO - IBM Security Threat Management www.ibm.com/security Co-Chair - Open Cybersecurity Alliance, Project Governing Board www.opencybersecurityalliance.org      


  • 5.  Re: [cti] [Non-DoD Source] [cti] How to model the object in this situation

    Posted 03-31-2021 15:47
    That sounds great. Yes, the current view of infrastructure is attacker infrastructure because that is was the model designs that people were bringing to the table. Often it is hard to get a large group like this to move forward on something without a solid initial proposal and commitment from people to drive the work forward. If you have that now, that would be great.  Bret On Mar 31, 2021, at 7:55 AM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote:   Back in 2017 when Infrastructure was created, non-attacker-infrastructure was a non-goal of the object           1) The primary goal is to document attacker infrastructure. Specifically where malware was delivered from and where it is beaconing to.          2) If other types of architecture can be documented, okay, but that is not our focus right now. We thus went in the direction of a custom object because Infrastructure does not have any of the data we are actually trying to model when one thinks of an asset, and is currently very attacker-focused (see infrastructure-type-ov vocabulary for example). As opposed to trying to get people to re-think what Infrastructure means, it seems cleaner to make a seperate object for this very different use case.    I am open to maybe extending infrastructure (I am open to anything at this point....) but we would have to consider the impact of that to users of it.   Our goal is to have proven working open source code and implementations. Once any issues are shaken out with those the extension could certainly be taken up by the TC if it wanted to do that.   - Jason Keirstead Distinguished Engineer, CTO - IBM Security Threat Management www.ibm.com/security Co-Chair - Open Cybersecurity Alliance, Project Governing Board www.opencybersecurityalliance.org      


  • 6.  Re: [cti] [Non-DoD Source] [cti] How to model the object in this situation

    Posted 03-31-2021 15:57
    All: Earlier on this thread Jeffrey mentioned that he had a stub for an Asset object. I wonder if we should schedule a working session to flush this out a little bit? It seems like there is a fair amount of interest in pushing this forward. If there is a demand for this within the community, I think we should follow Bret's roadmap for releases of object-specific documents until we are at a stage for a minor release. The most important thing, however, is that we don't cause any delay to the work on the Interop Committee Notes and the STIXPreferred website update. As a TC, that is a high priority for us. So, we need to weigh resource availability to work on an Asset object, relative to the work that Marlon and Rajesh are moving forward on Interop. Thanks Jessie for getting this dialogue started. Jane On 3/31/2021 8:47 AM, Bret Jordan wrote: That sounds great. Yes, the current view of infrastructure is attacker infrastructure because that is was the model designs that people were bringing to the table. Often it is hard to get a large group like this to move forward on something without a solid initial proposal and commitment from people to drive the work forward. If you have that now, that would be great. Bret On Mar 31, 2021, at 7:55 AM, Jason Keirstead < Jason.Keirstead@ca.ibm.com > wrote: Back in 2017 when Infrastructure was created, non-attacker-infrastructure was a non-goal of the object 1) The primary goal is to document attacker infrastructure. Specifically where malware was delivered from and where it is beaconing to. 2) If other types of architecture can be documented, okay, but that is not our focus right now. We thus went in the direction of a custom object because Infrastructure does not have any of the data we are actually trying to model when one thinks of an asset, and is currently very attacker-focused (see infrastructure-type-ov vocabulary for example). As opposed to trying to get people to re-think what Infrastructure means, it seems cleaner to make a seperate object for this very different use case. I am open to maybe extending infrastructure (I am open to anything at this point....) but we would have to consider the impact of that to users of it. Our goal is to have proven working open source code and implementations. Once any issues are shaken out with those the extension could certainly be taken up by the TC if it wanted to do that. - Jason Keirstead Distinguished Engineer, CTO - IBM Security Threat Management www.ibm.com/security Co-Chair - Open Cybersecurity Alliance, Project Governing Board www.opencybersecurityalliance.org


  • 7.  Re: [cti] [Non-DoD Source] [cti] How to model the object in this situation

    Posted 03-31-2021 17:11
    On 3/31/21 08:47, Bret Jordan wrote: > That sounds great. Yes, the current view of infrastructure is attacker > infrastructure because that is was the model designs that people were > bringing to the table. Often it is hard to get a large group like this > to move forward on something without a solid initial proposal and > commitment from people to drive the work forward. If you have that now, > that would be great. We've been working on some stuff in this space and will gladly contribute and help drive this forward. -- christian o. hunt principal security engineer cvoid@newcontext.com gpg key available on request


  • 8.  Re: [cti] [Non-DoD Source] [cti] How to model the object in this situation

    Posted 04-01-2021 03:10
    It seems like there is enough interest now in some of these things. So we should all work together on them, instead of everyone separately. How can I help assist you all to be successful in getting this off the ground? Bret > On Mar 31, 2021, at 11:10 AM, Christian Hunt <cvoid@newcontext.com> wrote: > > On 3/31/21 08:47, Bret Jordan wrote: >> That sounds great. Yes, the current view of infrastructure is attacker >> infrastructure because that is was the model designs that people were >> bringing to the table. Often it is hard to get a large group like this >> to move forward on something without a solid initial proposal and >> commitment from people to drive the work forward. If you have that now, >> that would be great. > > We've been working on some stuff in this space and will gladly > contribute and help drive this forward. > > -- > christian o. hunt > principal security engineer > cvoid@newcontext.com > > gpg key available on request > > --------------------------------------------------------------------- > To unsubscribe from this mail list, you must leave the OASIS TC that > generates this mail. Follow this link to all your TCs in OASIS at: > https://www.oasis-open.org/apps/org/workgroup/portal/my_workgroups.php >