stix in practice for incident response

25
SESSION ID: #RSAC Freddy Dezeure STIX in Practice for Incident Response HT-F03 Head of CERT-EU http://cert.europa.eu/

Upload: votuong

Post on 07-Feb-2017

227 views

Category:

Documents


3 download

TRANSCRIPT

Page 1: STIX in Practice for Incident Response

SESSION ID:

#RSAC

Freddy Dezeure

STIX in Practice for Incident Response

HT-F03

Head of CERT-EUhttp://cert.europa.eu/

Page 2: STIX in Practice for Incident Response

#RSAC

About Us

EU Institutions’ own CERT

Supports 60+ entities

Operational defense against cyber threats

2

Page 3: STIX in Practice for Incident Response

#RSAC

Other EU Cyber Bodies

ENISA

Europe-wide mandate in cyber security

Supporting best practices, capacity building and awareness raising

EUROPOL EC3

Europe-wide mandate in fight against cyber-crime

Operational cooperation between police computer crime units

3

Page 4: STIX in Practice for Incident Response

#RSAC

Services

Alerts

Specialised support

Peers & PartnersLaw enforcement

Prevention Detection ResponseIncidentHandling

Malwareanalysis

Threatassessment

AdvisoriesWhite Papers

Threat Intelligence

SecurityTools

ConstituentsConstituentsConstituentsConstituents

FeedsIOCsRules

Context

CERT-EU

4

Page 5: STIX in Practice for Incident Response

#RSAC

Services

Alerts

Specialised support

Peers & PartnersLaw enforcement

Prevention Detection ResponseIncidentHandling

Threatassessment

AdvisoriesWhite Papers

Threat Intelligence

ConstituentsConstituentsConstituentsConstituents

FeedsIOCsRules

Context

CERT-EU

Malwareanalysis

SecurityTools

5

Page 6: STIX in Practice for Incident Response

#RSAC

Agenda

Introduction

Architecture

Use case 1: Detection

Use case 2: Scoping

Use case 3: Strategic insight

Apply

6

Page 7: STIX in Practice for Incident Response

#RSAC

STIX Model+

RelatedIndicator

Organisation

Associated Campaigns

Related Indicators

RelatedIndicators

SubObservables

ObservablesRelated TTPRelatedTTP

Historical Campaigns

AttributionRelated

Incidents

AssociatedActors

Observed TTP

LeveragedTTP

COATaken COA

Requested

Related Threat Actors

Related Incidents

SuggestedCOA

Related TTP

Exploit Target

VictimsSourcesClients

Page 8: STIX in Practice for Incident Response

#RSAC

IndicatorsObservables

ActorsTTPs

CampaignsCourses of

ActionTargets

IncidentsOrganisations

CTI-db

Impo

rt C

ontr

ol

Expo

rt C

ontr

ol

Colle

ctor

Prod

ucer

Unstructured

CTI RepositorySources Data

RecipientsProducts

Feeds

Structured

Exte

rnal

In

telli

genc

e

MISP

STIX/Cybox

Inte

rnal

In

telli

genc

e

STIX / Cybox

MISP

Specific Threatsl

Threat Landscape

Constituents

Peers

Partners

Constituents

Othersources

CERT-EU

Partners

Peers

CTI Architecture

8

Page 9: STIX in Practice for Incident Response

#RSAC

CTI Architecture

FormattingContextualisation

Standard FormatRouting

Course of Action

Correlation

CollectedThreat data

SharedThreat data

CERT-EUCTI

Repository

Others

Partners

Peers

Sources

Constituents

Partners

Peers

Consumers

Constituents

FeedbackPositives

False Positives

9

Page 10: STIX in Practice for Incident Response

#RSAC

Threat Data Collection

Large diversity of information sources Too much irrelevant information Accuracy not guaranteed Unclear timing Unclear sighting or targeting Difficult prioritisation

10

Page 11: STIX in Practice for Incident Response

#RSAC

Contextualisation

Raw Minimal Context

Timing

Types Values

Date

Dete

ct

Date

Star

t

Date

End

Targeting

Continent

Sector /Industry

KillChain

1. Scan/Reco2. Weapon3. Delivery4. Exploit5. Install6. CnC7. Actions

Country

Organisation

Extended Context

TTP Campaign Actor

Industry best practice?

11

Page 12: STIX in Practice for Incident Response

#RSAC

Poor ContextTiming Detect_date Start_date End_dateKillChain Targeting Geoloc Sector

Timing Detect_date Start_date End_dateKillChain Targeting Geoloc Sector

12

Page 13: STIX in Practice for Incident Response

#RSAC

Better ContextTiming Detect_date Start_date End_date N/AKillChain Targeting Geoloc Sector

13

Page 14: STIX in Practice for Incident Response

#RSAC

World-Class - EU-I might be

'opportunity' or 'collateral' victims of major world-wide threats

EU Nearby - Targeting close partners (e.g. NATO, USA)

EU-Centric – Targeting EU Member States

EU-I - Targeting one or more constituents

HighVery sophisticated APT

MediumAPT

LowNon-targeted mass attacks / malware

Threat ScopeThreat Level

Threat ScopeWorld-Wide EU-nearby EU-centric EU-I

HIGH

MEDIUM

LOW

Threat level

Out of scope = 'noise'

High priority threat

Highpriority

Highpriority

Highpriority

Medium priority threatMediumpriority

Mediumpriority

Mediumpriority

Low priority threat

Lowpriority

Lowpriority

Lowpriority

Page 15: STIX in Practice for Incident Response

#RSAC

Constituent Perspective

Limited resources

Specific IT security tools

Specific policies

Prioritisation

Automation / Routing

Minimise false-positives

Actionable context when needed

15

Page 16: STIX in Practice for Incident Response

#RSAC

SelectionRouting

IDS Firewall IntelligenceAwareness

Mail server Log analyser

HostScanner

SIEM

Threat Data Sharing

Raw

PrioritiseDecide

Act

Context+

16

Page 17: STIX in Practice for Incident Response

#RSAC

STIX Model

RelatedIndicator

Related Indicators

RelatedIndicators

SubObservables

ObservablesRelated TTPRelatedTTP

AttributionRelated

Incidents

Observed TTP

LeveragedTTP

Related TTP

Page 18: STIX in Practice for Incident Response

#RSAC

Use Case 1: Detection

IndicatorsObservables

ActorsTTPs

CampaignsCourses of

ActionTargets

IncidentsOrganisations

CTI-db

Expo

rt C

ontr

ol

Prod

ucer

RecipientsProducts

SNORT

STIX / Cybox

MISP

Constituents

Peers

Partners

YARA

CSV

SOURCEFIRESURICATA

Q-RADARARCSIGHT

SPLUNK

TH0RnCASE

Proxy

Detection

IndicatorsObservables

ActorsTTPs

CampaignsCourses of

ActionTargets

IncidentsOrganisations

CTI-db

18

Page 19: STIX in Practice for Incident Response

#RSAC

Use Case 2: ScopingMalware reversingInternal process

Scanning for IOCs in logs and hosts Scanning for anomalous traffic Hits on the proxy/IDS

External process Has anybody else seen this?

No? -> You’re on your own Yes? -> Multiply knowledge on IOCs What’s the timeline

Sinkholing

19

Page 20: STIX in Practice for Incident Response

#RSAC

Pivoting via Actor / Campaign

Incident 1

Incident 3Incident 2

Incident 1

Incident 3

Incident 2

Unique TTPsYaraSnort

20

Page 21: STIX in Practice for Incident Response

#RSAC

Use Case 3: Strategic Insight

• Immediate reaction to threats: Detection, Prevention, Reaction (eradication, recovery), Report

• Dynamic feeding cyber-defense tools: IDS, IPS, SIEM, Security Scanners, Mailguard, Firewalls, etc

• Cyber-defense teams• IT administrators(or direct tool feeding)

IOCsRules

(Near real-time -> Towards full automation)

CIMBLFeeds

• Understanding cyber-attacks tactical context: threat type and level, timing of events, techniques/malware used.

• Planning structured course of actions for permanent protection

• CIO• Cyber-defense teams For every new

significant campaignCITAR

• Understanding the broader context. • Strategic context: profile, motives, new

techniques/tactics, sector and location of victims, business risk.

• Planning high level actions for non-technical treatment of the threat.

• CEO• Business VP• CIO Periodic Bulletin

Threat Landscape

SecurityBrief

Tech

nica

lTa

ctic

alSt

rate

gic

Page 22: STIX in Practice for Incident Response

#RSAC

Current Content

Threat Actors• 200+• Espionage/Strategic• Hacktivists• Cyber-criminals

Campaigns• 300+• Espionage (political, industrial, etc)• Hacktivism• CyberCrime

Observables• 800.000 targeted IOCs• Malicious Domains = 65 % • Malicious Files = 10%• Malicious email addresses = 8%• Malicious IP = 5 %• Malicious URL = 4 %• Other (Regkey, snort, etc) = 8%

Victims• 500+• Continet/country• Sector (Diplomacy, Defense, Energy, Transport, etc)• Type (Private, Public)

Techniques, Tactics, Procedures

• 500+• "Idendity card" of malware, botnets, C&C infrastructures, tools, exploit-kits• Killchain analysis• Focus on sophisticated & targeted TTP

Incidents & Indicators

• 3000+ per year • Scope: Constituency / EU-centric / EU-nearby/ World-class

Victims

22

Page 23: STIX in Practice for Incident Response

#RSAC

Some Open Issues

How to manage lifetime of the data How to remove data downstream How to control sharing groups downstream Implement Course of Action How to maintain the treasure trove of TTPs

23

Page 24: STIX in Practice for Incident Response

#RSAC

Apply Slide

Insist with your suppliers to deliver context with their feeds

Identify “your” definitions to filter inputs/outputs Threat scope and level Sharing groups Course of Action …

Start implementing your own internal STIX repository

Embed it in your processes

24

Page 25: STIX in Practice for Incident Response

#RSACThank You!http://cert.europa.eu/