[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: Re: [cti-stix] STIX Sightings
(1) Analyst from member company of ISAC "X" detects SpearPhish, DDOS, Scanning, etc. and want's more information from other members within ISAC "X"
(2) ISAC "X" Analysts send an RFI through an intermediary like the NCI (National Council of ISACs) to all other NCI Member Sector ISACs. What do you know about "Y", Have you seen "Z", etc.
(3) Analyst "A" has Malware sample and needs to submit it to Agency "B" to establish actionable IOCs ASAP.
I feel like the use case around RFI is not clearly fleshed out.
What parties and systems would be issuing RFI requests and under what circumstances?
What parties and systems would be responding to said requests?
Only once those two things are well documented and understood by all can we understand how to best service such a request.
As an example of why this is important... I believe only a tiny fraction of potential TAXII client systems would ever have an ability to respond to historical RFI requests... Most would not. So maybe this RFI capability should be limited to only TAXII servers who implement a "repository" specification.
Sent from IBM Verse
Aharon Chernin --- Re: [cti-stix] RE: STIX Sightings ---
From: | "Aharon Chernin" <achernin@soltra.com> |
To: | "Trey Darley" <trey@soltra.com>, "Terry MacDonald" <terry@soltra.com> |
Cc: | "Barnum, Sean D." <sbarnum@mitre.org>, "Patrick Maroney" <Pmaroney@Specere.org>, "Davidson II, Mark S" <mdavidson@mitre.org>, "Joep Gommers" <joep@eclecticiq.com>, "Jonathan Bush (DTCC)" <jbush@dtcc.com>, cti-stix@lists.oasis-open.org |
Date: | Fri, Oct 30, 2015 11:38 AM |
Subject: | Re: [cti-stix] RE: STIX Sightings |
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]