MISP / MISP

MISP (core software) - Open Source Threat Intelligence and Sharing Platform
https://www.misp-project.org/
GNU Affero General Public License v3.0
5.26k stars 1.38k forks source link

Introduce a new layer of informational elements to describe the outcome of analyses #4251

Open iglocska opened 5 years ago

iglocska commented 5 years ago

Analysis object, attachable to attributes/objects/events.

We had an interesting discussion about having complex analytical processes on individual indicators with their outcome being the equivalent of a ground truth for the given organisation. The idea is to have something that:

  1. Is more verbose than a sighting, being able to describe both the outcome as well as the reason why that outcome was reached.
  2. Make sure that it is actionable in a sense that it should act as an override for the automation systems (unlike false positives via sightings)
  3. Take into account existing outcome labels coming from the community (feedback welcome on what is being used).

Some additional points to keep in mind: This is a concern that should be co-ordinated with the Hive.

cgi1 commented 5 years ago

Thanks for the discussion!

Link to The Hive issue: https://github.com/TheHive-Project/TheHive/issues/886 - The feature request has not been discussed as closely as we did it today. So maybe its better to start from scratch.

Regarding point 3) a proposal: There should be an attribute-type-dependent and attribute-type-independen taxonomy for the outcome.

attribute-type-dependent

ip

domain

attribute-type-in-dependent

File not found

Downloaded file is not malicious

IoC is detecting the wrong threat / has the wrong threat level

General challanges

There will always be situations in which preventive policies of the respective network have avoided an infection. The result of this particular alarm is then a false positive for the company, although the actual IoC has delivered a malicious file. Example: The malware-download of a macro loader getting detected, but the code can never be executed due to preventive restrictions on the workstations within the network. The result for the company would be: False-Positive in this concret case; No further action required. Should this IoC be marked as False-Positive in MISP? Absolutely not. This is not rocket since, but we need to keep in mind that the incident classification depends on the circumstances in the respective company.