[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]
Subject: RE: [EXT] [cti] RE: Common repository for STIX CTI objects
Hi Rich, As for the second (Mark's) URL, by > , which unfortunately seems not active any more. I tried to communicate that the URL is accessible, but
there is nothing useful available. When I accessed it
four or so years ago, there were decent STIX files there. (Sorry, but I failed to check the first one in advance.
I assumed it should be there as it is from DoD.) One thing I realized from those cases, though, is
that it is important to consider the sustainability of the resources.
Regards, Ryu From: Rich Piazza <rpiazza@mitre.org>
Hi Ryu, Thanks for the info, but I was unable to get any useful information from the two URLs you sent. Do you have other access to this? Rich From: "masuoka.ryusuke@fujitsu.com" <masuoka.ryusuke@fujitsu.com> Hi, Rich, Thank you for your email.
Please keep me in the loop for the discussion.
But, it may be more important to start the thing rolling than to keep discussing. ----- By the way, I remember Mark (Clancy) of Soltra had a similar idea and had stood up a site when I met him in Florida, Jan. of 2016.
The idea was to generate generic CTI and use the CTI elements in the new CTI by referencing them.
For example, Defense Science Board had categorization of threat actors like Tier I, ..., Tier VI. Create generic CTI of those categories and use them in your new
STIX by referencing them.
Resilient Military Systems and the Advanced Cyber Threat http://www.acq.osd.mil/dsb/reports/ResilientMilitarySystems.CyberThreat.pdf You can use the same idea for generic CTI TTP elements like Water Hole Attack and Spear Phishing and refer them in your new CTI. Based on the idea, Mark had a web site and provided CTI reference data at
Threat Actor Lab http://edge.threatactorlab.com/ , which unfortunately seems not active any more.
Regards, Ryu From: Rich Piazza <rpiazza@mitre.org>
Hi Ryu, How we manage this repository is completely open for discussion. Of the top of my head, it might just be fronted by a TAXII server, and consumers and producers just regularly accept a data feed. As far as versioning goes â my assumption is that all objects would have a common object creator (i.e., the maintainers of the repository), so versioning shouldnât be an issue â unless you see
some potential problems. Thanks for your interest!! Rich -- Rich Piazza Lead Cyber Security Engineer The MITRE Corporation 781-271-3760 From: <cti@lists.oasis-open.org> on behalf of "masuoka.ryusuke@fujitsu.com" <masuoka.ryusuke@fujitsu.com> Hi Rich, I like the idea. I believe that usability for machines would be one of the important keys for it to fly.
I mean machine access to the repository, in particular, search capability.
It is also important, I believe, to consider if/how to deal with versioning. Nothing stays the same forever. Regards, Ryu From: cti@lists.oasis-open.org <cti@lists.oasis-open.org>
On Behalf Of Rich Piazza Many entities in cyber threat intelligence are common and having many duplicate STIX objects to represent the same concept has always been seen as wasteful and problematic. Several decisions made
when writing the STIX specification tried to take this into account. This includes: specification defined instances of TLP data markings, kill chain phases referred to by their names and deterministic identifiers for STIX cyber objects (SCOs). However, having
an easily available repository of common CTI objects has always been on the âwish listâ of members of the CTI-TC. DHS has tasked MITRE with investigating creating such a repository.
MITRE has already started a similar repository of STIX objects to represent both the ATT&CK and CAPEC frameworks. It is available at https://github.com/mitre/cti.
It certainly is the case that other organizations might want to do something similar with their cyber threat intellectual property. However, there are other STIX objects that are general enough to be hosted in a common repository, defined once and re-used
by the broader STIX community. Such a repository would foster consistency across STIX threat sharing efforts. In creating and using this repository, the amount of data transmitted over the wire could be reduced because only identifier references would need
to be shared.
Some of the objects types that immediately come to mind to include in this repository are locations (e.g., countries) and identities (e.g., industry sectors). Others types, like software (e.g., Microsoft
Word â version x) or tools (e.g., RDP) might be useful. Objects like IP addresses, which already can be considered unique if using deterministic identifiers, could be âstoredâ in this repository, so they need not be shared. Vulnerability objects representing
each CVE could be housed there also. Iâm sure there are other objects that could be included.
There are many issues to be discussed as part of setting up such a repository:
If you would like to be involved in making this happen, or just have some ideas, please get in touch. We can have a kickoff discussion at a future working call. Rich P. -- Rich Piazza Lead Cyber Security Engineer The MITRE Corporation 781-271-3760
|
[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]