OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

cti-cybox message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Re: [cti-cybox] [Non-DoD Source] [cti-cybox] Draft mission statement for the CybOX standard - please comment by COB Friday 15 April


Trey and I plan on tackling this as part of our MVP discussion during Wednesday’s F2F discussion. Also, we feel that this is a critical issue that needs to be resolved in order for us to have clarity as to how CybOX will evolve, so depending on the discussion at the F2F goes, we’ll likely put forth a ballot measure on this topic on Friday.

Regards,
Ivan

From: <cti-cybox@lists.oasis-open.org> on behalf of Jason Keirstead <Jason.Keirstead@ca.ibm.com>
Date: Friday, April 15, 2016 at 3:09 PM
To: "Casey, Eoghan CIV DC3/DCCI" <Eoghan.Casey@dc3.mil>
Cc: Bret Jordan <bret.jordan@bluecoat.com>, Ivan Kirillov <ikirillov@mitre.org>, Allan Thomson <athomson@lgscout.com>, Trey Darley <trey@soltra.com>, OASIS CTI TC CybOX SC list <cti-cybox@lists.oasis-open.org>
Subject: RE: [cti-cybox] [Non-DoD Source] [cti-cybox] Draft mission statement for the CybOX standard - please comment by COB Friday 15 April

" The proposed changes to STIX and CybOX would require information in DFAX and MAEC to be duplicated into a STIX package rather than referenced by identifiers, and I cannot imagine what would happen with the observable details being translated from DFAX to STIX."

This whole use case is resting on the assumption that a single system is consuming DFAX, MAEC, and STIX simultaneously and storing them all in one gigantic data model, because that is the only way that a STIX object could directly reference a DFAX object.

Is this something that is done in practice? Is this a use case we're trying to solve? If this is a problem we have to solve, then MAEC and DFAX really should be part of this CTI, because that is a *huge* requirement.

We have a forensics product as well, so DFAX is always on my mind, but honestly I do not envision a use case whereby we will ever be directly linking between STIX and DFAX artifacts. The Cybox would always be copied. Doing otherwise is not logical in my mind, as a piece of Cybox is a fact described by a grammar, it is not an object to be linked about, it can't be because it is not an instance.

-
Jason Keirstead
STSM, Product Architect, Security Intelligence, IBM Security Systems
www.ibm.com/security | www.securityintelligence.com

Without data, all you are is just another person with an opinion - Unknown


Inactive hide details for "Casey, Eoghan CIV DC3---04/15/2016 03:35:03 PM---Bret -  The JSON mockup is our attempt to interpret"Casey, Eoghan CIV DC3---04/15/2016 03:35:03 PM---Bret - The JSON mockup is our attempt to interpret what has been proposed for CybOX 3.0 and putting

From: "Casey, Eoghan CIV DC3/DCCI" <Eoghan.Casey@dc3.mil>
To: "'Jordan, Bret'" <bret.jordan@bluecoat.com>
Cc: "Kirillov, Ivan A." <ikirillov@mitre.org>, Allan Thomson <athomson@lgscout.com>, Trey Darley <trey@soltra.com>, "OASIS CTI TC CybOX SC list" <cti-cybox@lists.oasis-open.org>
Date: 04/15/2016 03:35 PM
Subject: RE: [cti-cybox] [Non-DoD Source] [cti-cybox] Draft mission statement for the CybOX standard - please comment by COB Friday 15 April
Sent by: <cti-cybox@lists.oasis-open.org>





Bret -

The JSON mockup is our attempt to interpret what has been proposed for CybOX 3.0 and putting Observations into STIX. The example JSON demonstrates how difficult it would be to link between STIX and DFAX. In short, the proposed changes will create major problems in your and my day-jobs, so let's work through the details at the F2F.

Eoghan

-----Original Message-----
From: Jordan, Bret [
mailto:bret.jordan@bluecoat.com]
Sent: Friday, April 15, 2016 2:16 PM
To: Casey, Eoghan CIV DC3/DCCI
Cc: Kirillov, Ivan A.; Allan Thomson; Trey Darley; OASIS CTI TC CybOX SC list
Subject: Re: [cti-cybox] [Non-DoD Source] [cti-cybox] Draft mission statement for the CybOX standard - please comment by COB Friday 15 April

Eoghan,

Is this JSON mock up what you are proposing?  Or is it describing or illustrating an issue?  Please clarify.  

One super minor technical issue is the cybox label in an Observation is currently defined as an array of type cybox, not just a cybox object.

We, in my day-job, have the need to do exactly what you describe.  I am thinking that STIX would somehow, TBD, link to the DFAX or MAEC data.  Or if STIX consumed DFAX and MAEC at some point, they would just get embedded in STIX.  Not sure, this has yet to be discussed and figured out.


Thanks,

Bret



Bret Jordan CISSP
Director of Security Architecture and Standards | Office of the CTO Blue Coat Systems PGP Fingerprint: 63B4 FC53 680A 6B7D 1447  F2C0 74F8 ACAE 7415 0050 "Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."


On Apr 15, 2016, at 11:57, Casey, Eoghan CIV DC3/DCCI <Eoghan.Casey@dc3.mil> wrote:

Ivan,

I appreciate you taking the time to mockup an example.  Given the number of issues this raises, I suggest that we put this on the agenda for the F2F.

In advance of the F2F, consider an incident in which suspicious activity is observed in network logs (represented in a CybOX object sent to a SEIM), triggering incident response. My forensic examiner observes information on a compromised host, represented using DFAX, including items that require malware analysis. My reverse engineer observes information in the malware, represented in MAEC. My cyber threat fusion analyst observes information from other sources that correlate with both the DFAX and MAEC observables, and represents these findings in a STIX package to share with others. The proposed changes to STIX and CybOX would require information in DFAX and MAEC to be duplicated into a STIX package rather than referenced by identifiers, and I cannot imagine what would happen with the observable details being translated from DFAX to STIX.

As another example of how the proposal would make it difficult to relate a STIX object to a CybOX object, consider the scenario a threat actor was known to own an IP address that appeared in the attack. You would need to duplicate this part of the information and then add STIX links to tie all of these parts together.  This is a quick mockup of what that would look like.  The relationship names provided are not the correct STIX names, just for illustration purposes.

{
"type": "package",
"spec_version": "stix-2.0",
"ThreatActors": [
{
"type": "ThreatActor",
"id": "threatactor--1",
"spec_version": "stix-2.0",
"created_at": "2016-03-21T01:01:01Z"
}
]
"observations": [
{
"type": "observation",
"id": "observation--1",
"spec_version": "stix-2.0",
"created_at": "2016-03-21T01:01:01Z",
"observed_at": "2016-03-20T12:33:22Z",
"cybox": {
"objects": [
{
"type": "ipv4-addr-object",
"id": "ip-address--1",
"spec_version": "cybox-3.0",
"value": "1.2.3.4"
}
]
}
},
{
"type": "observation",
"id": "observation--2",
"spec_version": "stix-2.0",
"created_at": "2016-03-21T01:01:01Z",
"observed_at": "2016-03-20T12:33:22Z",
"cybox": {
"actions": [{
"id": "action--1",
"type": "cybox-action",
"name": "create network connection",
"associated_objects": [
{
"type": "associated-object",
"object_ref": "network-connection--1",
"association": "output of"
},
{
"type": "associated-object",
"object_ref": "process-object--1",
"association": "initiator of"
}
]
}],
"objects": [
{
"type": "network-connection",
"id": "network-connection--1",
"spec_version": "cybox-3.0",
"protocols":{"layer7":"http"}
},
{
"type": "ipv4-addr-object",
"id": "ip-address--1",
"spec_version": "cybox-3.0",
"value": "1.2.3.4"
},
{
"type": "domain-name-object",
"id": "domain-name--1",
"spec_version": "cybox-3.0",
"value": "
http://foo.bar.com"
},
{
"type": "email-message-object",
"id": "email-message--1",
"spec_version": "cybox-3.0",
"from": "bruce@wayne.com",
"subject": "Check this out!"
},
{
"type": "file-object",
"id": "file-object--1",
"hashes": {"md5": "B4D33B0C7306351B9ED96578465C5579"}
},
{
"type": "file-object",
"id": "file-object--2",
"hashes": {"md5": "FFCCAADC7306351B9ED96578465C5579"}
},
{
"type": "process-object",
"id": "process-object--1",
"pid":1234
}
],
"relationships": [
{
"type": "object-relationship",
"id": "object-relationship--1",
"spec_version": "cybox-3.0",
"source_ref": "email-message--1",
"target_ref": "file-object--1",
"kind_of_relationship": "has-attachment"
},
{
"type": "object-relationship",
"id": "object-relationship--2",
"spec_version": "cybox-3.0",
"source_ref": "file-object--1",
"target_ref": "file-object--2",
"kind_of_relationship": "contains"
},
{
"type": "object-relationship",
"id": "object-relationship--3",
"spec_version": "cybox-3.0",
"source_ref": "file-object--2",
"target_ref": "proces-object--1",
"kind_of_relationship": "image-of"
},
{
"type": "object-relationship",
"id": "object-relationship--4",
"spec_version": "cybox-3.0",
"source_ref": "domain-name--1",
"target_ref": "network-connection--1",
"kind_of_relationship": "destination-of"
},
{
"type": "object-relationship",
"id": "object-relationship--5",
"spec_version": "cybox-3.0",
"source_ref": "domain-name--1",
"target_ref": "ip-address--1",
"kind_of_relationship": "resolves-to"
}
]
}
}
],
"Relationships": [
{
"type": "relationship",
"id": "relationship--1",
"spec_version": "stix-2.0",
"source_ref": "threatactor--1",
"target_ref": "observation--1",
"kind_of_relationship": "owns"
},
{
"type": "relationship",
"id": "relationship--2",
"spec_version": "stix-2.0",
"source_ref": "observation--2",
"target_ref": "observation--1",
"kind_of_relationship": "contains"
}
]
}



-----Original Message-----
From: Kirillov, Ivan A. [
mailto:ikirillov@mitre.org]
Sent: Friday, April 15, 2016 11:53 AM
To: Allan Thomson
Cc: Casey, Eoghan CIV DC3/DCCI; Trey Darley; OASIS CTI TC CybOX SC list
Subject: Re: [cti-cybox] [Non-DoD Source] [cti-cybox] Draft mission statement for the CybOX standard - please comment by COB Friday 15 April

I like the use of “interconnected”, but I would be hesitant to mention any sort of context, especially around threats – this would imply that CybOX can actually capture the nature of the threat itself, which IMO is something that requires a higher form of analysis and should instead be covered by STIX.

I put together a JSON snippet (also on Github [1]) that demonstrates how a STIX Observation could capture the the details of the example that Eoghan mentioned around an email with a malicious attachment that creates a network connection; additional instances of this Observation could be captured using a Sightings object. Note that some of the Object fields and relationships here are notional, but this approximates what we currently have in CybOX 3.0. Is there anything that we’re missing here in terms of capability?


{
   "type": "package",
   "spec_version": "stix-2.0",
   "observations": [{
       "type": "observation",
       "id": "observation--1",
       "spec_version": "stix-2.0",
       "created_at": "2016-03-21T01:01:01Z",
       "observed_at": "2016-03-20T12:33:22Z",
       "cybox": {
           "actions": [{
               "id": "action--1",
               "type": "cybox-action",
               "name": "create network connection",
               "associated_objects": [
                   {
                       "type": "associated-object",
                       "object_ref": "network-connection--1",
                       "association": "output of"
                   },
                   {
                       "type": "associated-object",
                       "object_ref": "process-object--1",
                       "association": "initiator of"
                   }
               ]
           }],
           "objects": [
               {
                   "type": "network-connection",
                   "id": "network-connection--1",
                   "spec_version": "cybox-3.0",
                   "protocols":{"layer7":"http"}
               },
               {
                   "type": "ipv4-addr-object",
                   "id": "ip-address--1",
                   "spec_version": "cybox-3.0",
                   "value": "1.2.3.4"
               },
               {
                   "type": "domain-name-object",
                   "id": "domain-name--1",
                   "spec_version": "cybox-3.0",
                   "value": "
http://foo.bar.com"
               },
               {
                   "type": "email-message-object",
                   "id": "email-message--1",
                   "spec_version": "cybox-3.0",
                   "from": "bruce@wayne.com",
                   "subject": "Check this out!"
               },
               {
                   "type": "file-object",
                   "id": "file-object--1",
                   "hashes": {"md5": "B4D33B0C7306351B9ED96578465C5579"}
               },
               {
                   "type": "file-object",
                   "id": "file-object--2",
                   "hashes": {"md5": "FFCCAADC7306351B9ED96578465C5579"}
               },
               {
                   "type": "process-object",
                   "id": "process-object--1",
                   "pid":1234
               }
           ],
           "relationships": [
               {
                   "type": "object-relationship",
                   "id": "object-relationship--1",
                   "spec_version": "cybox-3.0",
                   "source_ref": "email-message--1",
                   "target_ref": "file-object--1",
                   "kind_of_relationship": "has-attachment"
               },
               {
                   "type": "object-relationship",
                   "id": "object-relationship--2",
                   "spec_version": "cybox-3.0",
                   "source_ref": "file-object--1",
                   "target_ref": "file-object--2",
                   "kind_of_relationship": "contains"
               },
               {
                   "type": "object-relationship",
                   "id": "object-relationship--3",
                   "spec_version": "cybox-3.0",
                   "source_ref": "file-object--2",
                   "target_ref": "proces-object--1",
                   "kind_of_relationship": "image-of"
               },
               {
                   "type": "object-relationship",
                   "id": "object-relationship--4",
                   "spec_version": "cybox-3.0",
                   "source_ref": "domain-name--1",
                   "target_ref": "network-connection--1",
                   "kind_of_relationship": "destination-of"
               },
               {
                   "type": "object-relationship",
                   "id": "object-relationship--5",
                   "spec_version": "cybox-3.0",
                   "source_ref": "domain-name--1",
                   "target_ref": "ip-address--1",
                   "kind_of_relationship": "resolves-to"
               }
           ]
       }
   }]
}


[1]
https://gist.github.com/ikiril01/a24c0fabfe96933f051f0920f5589b77

Regards,
Ivan

From: Allan Thomson <athomson@lgscout.com>
Date: Friday, April 15, 2016 at 9:17 AM
To: Ivan Kirillov <ikirillov@MITRE.ORG>
Cc: "Casey, Eoghan CIV DC3/DCCI" <Eoghan.Casey@dc3.mil>, Trey Darley <trey@soltra.com>, OASIS CTI TC CybOX SC list <cti-cybox@lists.oasis-open.org>
Subject: Re: [cti-cybox] [Non-DoD Source] [cti-cybox] Draft mission statement for the CybOX standard - please comment by COB Friday 15 April


I would agree with Eoghan that all context not just meta data is relevant to threat detection.  

I see why you would want a shorter definition though and suggest the following based on the proposal:

"CybOX is a library of standard type definitions for the representation and interchange of network threat context related to artifacts of interconnected systems, used by STIX and other standards.”

I’m also fine with the version that Eoghan referred to but if the group wants a shorter version please consider the above changes.

allan


On Apr 15, 2016, at 7:57 AM, Kirillov, Ivan A. <ikirillov@MITRE.ORG> wrote:

Eoghan,

I hear what you’re saying. However, Actions, Objects, and Relationships in CybOX are not going away, so I think the heart of this debate lies around the notion of context.

IMO, this statement from the previous description lies at the heart of the matter:

“[CybOX offers] a common solution for all cyber security use cases requiring the ability to deal with cyber observables”

In my belief, this is untenable and unreasonable because 1) we do not and never will understand all cyber security use cases around observables 2) it is naïve to state that we can support all such cases, especially in terms of characterizing the context around them. Thus, it doesn’t make sense to have a generic Observable.

Accordingly, with the mission statement put forth, one can still characterize and capture observables using the types defined in CybOX. However, it’s up to the language doing so to define the context around this; in STIX this is done with the Observation (which can be versioned, marked, etc.), in MAEC it is done primarily through the Analysis type and its corresponding entities, and so forth. If DFAX or a language around digital forensics needs to capture observables, it can create its own type for doing so, which defines the context around forensics-specific observables; at the core of such an observable, CybOX Objects, Actions, and Relationships could still be leveraged. Thus, while it may appear on the outset that we’re losing out on a generic observable structure, I think forcing the context around observations to be defined by the user of CybOX leads to clearer semantics whilst still building upon the key concepts (Objects, et. Al) that made CybOX so useful to start with.

Regards,
Ivan



On 4/15/16, 8:07 AM, "cti-cybox@lists.oasis-open.org on behalf of Casey, Eoghan CIV DC3/DCCI" <cti-cybox@lists.oasis-open.org on behalf of Eoghan.Casey@dc3.mil> wrote:



Trey,

I have major issues with the language of the proposed CybOX missions statement.

The usefulness of CybOX is contingent on the ability to represent/express the context and relationship of items, not just metadata.

As an example, we need CybOX to represent a message that has an attachment that contains a malicious payload that installs an executable that opens a network connection to a domain that resolves to an IP address. In addition to representing the associated objects and relationships, we need to capture each time this observable occurs.

I see Observables, Relationships and Actions as integral parts of CybOX that make it useful across cyber domains.

The proposed mission statement would require a renaming of CybOX from Cyber Observable _expression_ to Cyber Object _expression_.

Be aware that CybOX has been well-described previously:

Standardizing Cyber Threat Intelligence Information with the Structured Threat Information _expression_ (STIX™)
http://stixproject.github.io/getting-started/whitepaper/
"CybOX is a language for encoding and communicating standardized high-fidelity information about cyber observables, whether dynamic events or stateful measures properties that are observable in the operational cyber domain. CybOX, like STIX, is not targeted at a single cyber security use case but rather is intended to be flexible enough to offer a common solution for all cyber security use cases requiring the ability to deal with cyber observables. It is also intended to be flexible enough to allow both the high-fidelity description of instances of cyber observables that have been measured in an operational context as well as more abstract patterns for potential observables that may be targets for observation and analysis apriori."

Eoghan

-----Original Message-----
From: cti-cybox@lists.oasis-open.org [
mailto:cti-cybox@lists.oasis-open.org] On Behalf Of Trey Darley
Sent: Friday, April 15, 2016 5:04 AM
To: OASIS CTI TC CybOX SC list
Subject: [Non-DoD Source] [cti-cybox] Draft mission statement for the CybOX standard - please comment by COB Friday 15 April

Hi, all -

There's been an enormous amount of discussion over the past several weeks regarding what CybOX should be and where the tearline is with other standards that leverage CybOX. It seems like that old familiar situation we find ourselves in so often, talking past one another in more-or-less violent agreement.

This week Ivan and I put our heads together and came up with the following mission statement for CybOX:

<snip>
CybOX is a library of standard type definitions for the representation and interchange of metadata related to artifacts of computational systems, used by STIX and other standards.
</snip>

In general, mission statements tend to be touchy-feely BS, but in this case we felt like having a clear mission statement would effectively put a stake in the ground and end a lot of the fruitless circular discussions that have plagued us lately.

We discussed the draft mission statement during yesterday's CybOX SC working call and there appeared to be complete consensus that this was a positive move. Our plan is to open a TC ballot measure to
(hopefully) once and for all nail down a clear definition for what CybOX is.

There were a few comments about the phrase "artifacts of computational systems". Since we already anticipate tackling a diverse set of use cases in future and there are surely many "unknown unknowns" lying ahead as well, we struggled mightily to come up with that phrasing.
(The obvious and utterly ridiculous alternative we were trying to avoid was "cyber stuff".)

The consensus coming out of yesterday's working call was that the current language is good enough and that we should put it to a TC vote.

If you have major issues with the draft language for the CybOX mission statement, please speak up today. Otherwise, we'll move to open a ballot on Monday 18 April.

--
Cheers,
Trey
--
Trey Darley
Senior Security Engineer
4DAA 0A88 34BC 27C9 FD2B  A97E D3C6 5C74 0FB7 E430 Soltra | An FS-ISAC & DTCC Company
www.soltra.com
--
"No matter how hard you push and no matter what the priority, you can't increase the speed of light." --RFC 1925











[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]