OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

cti-stix message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Re: [cti-stix] Asset TLO discussion


I do not think we should use a boolean flag to say an Asset is malicious.  As that means that Asset is always malicious.  What we talked about today on the call was collapsing down Asset and Malicious-Infrastructure in to a single Asset object... Then using the relationships to tie an Asset to a Campaign or Threat Actor with a verb link "used maliciously".  This would enable us to tie the relationship to a point in time and assign a confidence score to it.


Bret





From: cti-stix@lists.oasis-open.org <cti-stix@lists.oasis-open.org> on behalf of Jerome Athias <athiasjerome@gmail.com>
Sent: Tuesday, June 14, 2016 1:53 PM
To: Piazza, Rich
Cc: cti-stix@lists.oasis-open.org
Subject: Re: [cti-stix] Asset TLO discussion
 
Asset is a top level concept (note the difference with object (or subject wich is potentially better term semantically for what is currently called object...))

I tried to highlight that as a concept, an infrastructure could be a target/victim asset in one context (i.e. For one Organization) or/and a TTP asset in another context (or Organization)
The point being that it should be avoided to have the same concept/object called differently in various places/objects when the concept is the same, and the only difference is the 'boolean' malicious or not
Org A could use a laptop to target a laptop of Org B
Is laptop A a TTP and laptop B a Target? 
(Laptop A is an asset of Org A. Laptop B is an asset of Org B)
(Replace laptop by infrastructure...)

IMHO they would have the same properties
(Eg IP address)


On Tuesday, 14 June 2016, Piazza, Rich <rpiazza@mitre.org> wrote:

On today’s working call the topic of the Asset TLO came up.  Currently, the Asset TLO  is described in the “Potential TLO” google doc (https://docs.google.com/document/d/15qD9KBQcVcY4FlG9n_VGhqacaeiLlNcQ7zVEjc8I3b4 ), because that is where the text is located concerning TLOs that aren’t definitely in 2.0.  As Bret mentioned, much of that text is boilerplate…

 

Last week, I sent out some email discussing Incident, another TLO that is in the same state, which also included discussions of the Asset TLO.  It is thought that those two TLOs are connected such that both or neither should be in STIX 2.0.  The point of that email was to level-set everyone, summarizing what these two concepts were in STIX 1.2 and making comments and posing questions concerning what we need to discuss in order to include these TLOs into STIX 2.0.

 

Gary Katz brought up an aspect of discussion that I hadn’t thought of – how does Asset relate to Malicious Infrastructure, another potential TLO.  The consensus on the call, at least, was that these two potential TLOs concepts are too similar, therefore either could be used to represent some object – violating a 2.0 design goal.

 

I think that is more due to their colloquial definitions.  Returning to STIX 1.2, these were very different concepts, as Malicious Infrastructure was a type of TTP, and Asset was some object that was compromised by an Incident.  In other words, some object to be used in an attack as opposed to some object that WAS attacked (although they may be the same underlying object).  Put another way, Malicious Infrastructure was concerned more with HOW some infrastructure was used (e.g., as a botnet, C2 server, etc).  Asset was more about WHAT the object was, e.g., a laptop owned by a customer. ).  It is important to note that each of these had a field to describe characteristics of the object (e.g., IP_Address) using CybOX.

 

Do we need to maintain this distinction in STIX 2.0?  Can we collapse both of these concepts into one?

 

Let the conversation begin J

 



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]