[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: Re: [cti-stix] Need for Investigation/Tag object?
in case it could help to illustrate the topic: http://blog.sqrrl.com/the-threat-hunting-reference-model-part-3-the-hunt-matrix /JA "Education is the most powerful weapon which you can use to change the world.", Nelson Mandela 2015-11-06 22:46 GMT+03:00 Jyoti Verma (jyoverma) <jyoverma@cisco.com>: > Hi Terry, > > Apologize for jumping in late. The email got buried and I just got to it. > Thanks for putting together the use case. +1 on the cool ASCII art! > The 'investigation’ object for grouping related information during the > investigation process makes complete sense. In fact this was exactly what I > was envisioning in my mind and I’m glad you called it out that way. This > would help automate the journal entry process that analysts need to maintain > on a day to day basis. I would like to add a few points here: > > Investigation is done during in the detection phase to determine if there > has been a breach > A series of Investigative actions are done during the incident response > process to gather further information on the affected assets such as WhoIs > (the user for the asset), geolocation information, other assets of the user, > who all did the asset communicate with etc. This information helps > determine the response actions needed. > After incident response, some monitoring/investigation is done to determine > if the response worked as desired before the incident is closed. > > > The investigation activities during and post IR could either be captured in > the ‘investigation’ object or be used to enrich the incident object. > Thoughts? > > > Thanks, > > Jyoti > > > From: <cti-stix@lists.oasis-open.org> on behalf of Terry MacDonald > <terry@soltra.com> > Date: Friday, October 30, 2015 at 3:22 PM > To: "Davidson II, Mark S" <mdavidson@mitre.org>, "Jane Ginn - jg@ctin.us" > <jg@ctin.us>, "Sarah.Kelley@cisecurity.org" <Sarah.Kelley@cisecurity.org>, > Jerome Athias <athiasjerome@gmail.com>, Bret Jordan > <bret.jordan@bluecoat.com> > Cc: "cti-stix@lists.oasis-open.org" <cti-stix@lists.oasis-open.org> > > Subject: RE: [cti-stix] Need for Investigation/Tag object? > > Hi Mark, > > > > Sure… although TBH I’m not that happy with the current STIX v2 Use Case > structure on the wiki. To my mind it focuses on STIX and the ways it can be > used, when we should actually be focussing on the way that Threat > Intelligence can be used and documenting those use cases at the CTI TC level > – then deriving STIX/TAXII/CybOX requirements from that as a separate step. > But that’s a different discussion….. > > > > THE USE CASE IN STIX USE CASE WIKI FORMAT > > > > STIX v2.0 Use Case: Performing an Investigation > > > > Relevant to which SCs (STIX/TAXII/CybOX): STIX > > > > Abstraction Level (High, Medium or Low): Yes? > > > > Related Use Cases: Um? > > > > Description: > > Incident Handlers and Security Operations Centre monitoring staff are > constantly looking for unusual/suspicious events. These suspicious events > are ‘odd things that require further investigation’. A large percentage of > the time the investigation shows that the events are false positives of some > kind. A JPEG with a series of 0x9090909090 within it may trigger a rule > looking for x86 NOOP slides. Multiple failed SSH attempts against your > internal Cisco terminal server may in fact be a misconfigured script > somewhere. Not everything is malicious. > > > > Incident Handlers often operate with the following workflow (cool ASCII > art!): > > > > event/alert raised -> investigation opened -> investigate/analyze -> > official incident opened -> IR process > > | > > V > > false positive -> > investigation closed > > > > Often, as part of the ‘investigate/analyse’ step in the ASCII diagram above > we ask threat sharing groups if they have information that may help us with > our analysis. We try and find confirmation that something is bad is > happening – something that will require us to wake up 10 people in the > middle of the night to form the Virtual Incident Response Team. STIX would > be SOOOOOO much more useful if we had the ability to request information > about a sighting before we create an Incident and yet still allow us to > ‘track’ it somehow without us needing to declare a full official ‘Incident’. > > > > Incidents are only created when we have confirmed something is happening. > > > > That’s where the investigation/tag object comes in. Being able to link the > objects to the Investigation object would allow us to track the objects > related to the investigation when we are unsure if they are malicious, and > then easily create an Incident when we confirm that they are. This then also > means that the Incident can have a 1:1 relationship with the official > Incident in the Organizations ticketing system, making it far easier to > integrate STIX Incidents with the corporate ticketing system in the long > term. > > > > ---- > > > > In addition, while doing the daily hunting through proxy logs looking for > weirdness, one could find a strange URL pattern that we’ve never seen > before. It could easily be Symantec’s live update doing some weird > liveupdate stuff, or it could be a new piece of malware. If we then search > and find 25 other hosts on the internal network with the same pattern, we > want a way to link those together. That’s where the investigation/tag object > comes in. We could share out the examples of 25 URLs we’ve found to our > community with a STIX request, and could receive 10 STIX responses back with > more details about others who have experienced the same problem. They may > have extra information about what they’ve found or not, but in either case > that information then helps us with our investigation. They may even send us > their own investigation object or Incident which can all help us in our > investigation. > > > > Stakeholders/Goals: To > > > > ‧ Stakeholder: Incident Handlers > > > > o Goal: Group together ‘possibly’ related STIX objects so that initial > triage can be done. > > > > Preconditions: > > > > ‧ Depends on STIX v2 Sighting object > > > > Dependencies: > > ‧ Depends on proposed STIX v2 Request object > > ‧ Depends on proposed STIX v2 Response object > > ‧ Depends on STIX v2 Sighting object > > > > Main Success Scenario: > > ‧ Incident Handlers are able to perform investigations and send out > requests for more information about investigations before they turn into > official Incidents. > > > > Cheers > > > > Terry MacDonald > > Senior STIX Subject Matter Expert > > SOLTRA | An FS-ISAC and DTCC Company > > +61 (407) 203 206 | terry@soltra.com > > > > > > From: Davidson II, Mark S [mailto:mdavidson@mitre.org] > Sent: Friday, 30 October 2015 10:24 PM > To: Jane Ginn - jg@ctin.us <jg@ctin.us>; Terry MacDonald <terry@soltra.com>; > Sarah.Kelley@cisecurity.org; Jerome Athias <athiasjerome@gmail.com>; Bret > Jordan <bret.jordan@bluecoat.com> > Cc: cti-stix@lists.oasis-open.org > Subject: RE: [cti-stix] Need for Investigation/Tag object? > > > > Terry, Jane, (and perhaps Jyoti), > > > > Would you be able to describe the use case a little more? I’m thinking along > the lines of what’s been started on the STIX use cases wiki [1] – nominally > including a description and a main success scenario. That would help me > understand who takes which actions when and in what order, which in turn > would help me form an opinion about how well proposed solutions meet the use > case. > > > > At the data model level, this sounds like a possible use of a top level > relationship object. Just throwing something against the wall here (I’m not > a cyber analyst and I don’t play one on TV), but could this use case be > accomplished by relating multiple objects to a campaign with a low > confidence? > > > > Thank you. > > -Mark > > > > [1] https://github.com/STIXProject/use-cases/wiki > > > > From:cti-stix@lists.oasis-open.org [mailto:cti-stix@lists.oasis-open.org] On > Behalf Of Jane Ginn - jg@ctin.us > Sent: Thursday, October 29, 2015 4:53 PM > To: terry@soltra.com; Sarah.Kelley@cisecurity.org; Jerome Athias > <athiasjerome@gmail.com>; Bret Jordan <bret.jordan@bluecoat.com> > Cc: cti-stix@lists.oasis-open.org > Subject: Re: [cti-stix] Need for Investigation/Tag object? > > > > Terry & All: > > This is an actual Use Case that I've seen operationally in one of the ISAOs > I participate in. It is not theoretical. .. and the real-time nature of this > helps the non-targeted members of the ISAO to take proactive actions in > response to what is known (shared) about the Threat Actor, the IoCs, and the > TTPs. Offensive countermeasures in action. > > I could see this Use Case evolving into a very important one for driving > adoption of threat intel platforms... especially if the CybOX objects are > extracted, used in other tools for enrichment, then reconstructed as STIX > again. Thus later permutation aligns with the Use Case Jyoti introduced in > the CybOX Subcommittee call today. > > Jane Ginn, MSIA, MRP > Cyber Threat Intelligence Network, Inc. > jg@ctin.us > > > > -------- Original Message -------- > From: Terry MacDonald <terry@soltra.com> > Sent: Tuesday, October 27, 2015 01:03 PM > To: Sarah Kelley <Sarah.Kelley@cisecurity.org>,Unknown Unknown > <athiasjerome@gmail.com>,"Jordan, Bret" <bret.jordan@bluecoat.com> > Subject: [cti-stix] Need for Investigation/Tag object? > CC: "Baker, Jon" <bakerj@mitre.org>,"Jonathan Bush (DTCC)" > <jbush@dtcc.com>,Cory Casanave > <cory-c@modeldriven.com>,"cti-stix@lists.oasis-open.org " > <cti-stix@lists.oasis-open.org> > > Hi All, > > > > Sarah’s email below reminded me of some thoughts that have been bubbling > around for a while. > > > > I think there is a need for us to support describing and sharing Threat > intelligence while it is still under investigation. Historically STIX has > been used by Organizations who are generally sharing information about > attacks after they have finished. It seems to me that we are rapidly moving > towards an automated future where Organizations are sharing information > about attacks while they are happening. This change is a subtle one, but one > that has implications for STIX. > > > > At present we have no way for an Organizations to temporarily ‘group’ > different STIX objects together. When one is conducting an investigation > into a series of suspicious events prompted by your Organization’s > monitoring processes, we often want to tag/relate these events together, > without actually creating an official ‘Incident’ (as we’re not sure anything > has actually happened yet). The Incident object is where one would put the > information when it is confirmed there is a problem, but I believe we at > least need a way of ‘tagging’ and ‘grouping’ potentially related items > together. > > > > Does anyone else see the need for something like this? > > > > Cheers > > > > Terry MacDonald > > Senior STIX Subject Matter Expert > > SOLTRA | An FS-ISAC and DTCC Company > > +61 (407) 203 206 | terry@soltra.com > > > > > > From: Sarah Kelley [mailto:Sarah.Kelley@cisecurity.org] > Sent: Tuesday, 27 October 2015 10:18 PM > To: Unknown Unknown <athiasjerome@gmail.com>; Jordan, Bret > <bret.jordan@bluecoat.com> > Cc: Terry MacDonald <terry@soltra.com>; Baker, Jon <bakerj@mitre.org>; > Jonathan Bush (DTCC) <jbush@dtcc.com>; Cory Casanave > <cory-c@modeldriven.com>; cti-stix@lists.oasis-open.org > Subject: Re: [cti-stix] Conceptul model for sighting > > > > I am a huge proponent of letting (almost) anything link to anything. In > fact, limiting what can have an association/link/relationship with what is > my current biggest frustration with Stix (we use workarounds to get around > this limitation). > > > > I would add the possible use cases: > > > > My org observed 3 instances of this threat actor hitting our network > > My org observed 12 instances of the Poison Ivy TTP on our network > > Or even (though weaker): > > My org was hit by this particular campaign 27 times > > > > > > > > Sarah Kelley > > Senior CERT Analyst > > Center for Internet Security (CIS) > > Integrated Intelligence Center (IIC) > > Multi-State Information Sharing and Analysis Center (MS-ISAC) > > 1-866-787-4722 (7×24 SOC) > > Email: cert@cisecurity.org > > www.cisecurity.org > > Follow us @CISecurity > >
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]