OASIS Mailing List ArchivesView the OASIS mailing list archive below
or browse/search using MarkMail.

 


Help: OASIS Mailing Lists Help | MarkMail Help

cti message

[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]


Subject: Re: [cti] RE: [Non-DoD Source] [cti] Another STIX 2.1 Extension example


The thing I like about the nested extension under a UUID is that if you do not know about the extension it is super easy to just capture the data as JSON.Raw data and store it. Putting values at the top-level means you have to parse the data first and pull everything out that you know how to use, then loop back through to see if there is anything else and then try and figure out if you can do anything with it. I find that to be much more problematic.Â

Thanks,
Bret
PGP Fingerprint:Â63B4 FC53 680A 6B7D 1447 ÂF2C0 74F8 ACAE 7415 0050
"Without cryptography vihv vivc ce xhrnrw, however, the only thing that can not be unscrambled is an egg."


On Mon, Oct 19, 2020 at 3:12 PM Mates, Jeffrey CIV DC3/TSD <Jeffrey.Mates@dc3.mil> wrote:

Iâve started resuming work on the Incident object recently, and thought it would be a good candidate to test out extensions for a new SDO. Iâve attached a single sample of it with the extension that defines it along with the schema since I havenât been able to get it up to GitHub.

Â

From what I can tell it works well for creating new SDOs, but for extended them I do prefer option #1 as a consumer to option #2 as it means a shallower parse is permitted. I understand the risk of errors, but tracking down sub-properties of potentially variable UUIDs just feels like it will cause all extra grief on the consumer side for non-Internet connected systems.

Â

//SIGNED//

Â

Jeffrey Mates, Civ DC3/TSD

Computer Scientist

Technical Solutions Development

jeffrey.mates@dc3.mil

410-694-4335

Â

From: cti@lists.oasis-open.org <cti@lists.oasis-open.org> On Behalf Of Rich Piazza
Sent: Monday, October 19, 2020 3:37 PM
To: cti@lists.oasis-open.org
Subject: [Non-DoD Source] [cti] Another STIX 2.1 Extension example

Â

All active links contained in this email were disabled. Please verify the identity of the sender, and confirm the authenticity of all links contained within the message prior to copying and pasting the address to a Web browser.


Â

As part of the MITRE CTI repository (Caution-https://github.com/mitre/ctiÂ<ÂCaution-https://github.com/mitre/ctiÂ>Â), we expressed all of the CAPEC attack patterns using STIX.

Â

I converted one of the attack patterns (CAPEC-66: SQL Injection) from using custom properties to using property-extensions.Â

Â

As in other examples that people have posted â adding properties seems pretty straightforward. Maybe expressing a new object (SDO, SCO, SRO) using the new extension facility is an example someone could share to make sure it doesnât have any gotchas.

Â

Using the schema from the Extension Definition object for validation might be something more interesting to explore.

Â

ÂÂÂÂÂÂÂÂÂÂÂÂÂÂÂ Rich

Â

--Â

Rich Piazza

Lead Cyber Security Engineer

The MITRE Corporation

781-271-3760

Â

signature_1608542657

Â

Â

Â

Attachment: smime.p7s
Description: S/MIME Cryptographic Signature



[Date Prev] | [Thread Prev] | [Thread Next] | [Date Next] -- [Date Index] | [Thread Index] | [List Home]