A Collection of Information Security Community Standardization Activities and Initiatives |
|||||
Section Contents Items of Interest |
Cyber Intelligence Threat AnalysisCyber intelligence — or the collecting, analyzing and countering of cyber security threat information — is an essential capability in defending against today’s agile cyber adversaries. Cyber intelligence begins with gathering detailed information about attacks, such as spear-phishing email header and content, urls to malicious links, and malware analysis-derived artifacts like Command and Control (C2) domain names and IP addresses. With a corpus of threat data, skilled cyber analysts then group patterns of similar activity, attribute activity to certain threat actors, quickly identify and implement mitigation strategies, and anticipate the launch of similar attacks in the future. The Structured Threat Information eXpression (STIX) language helps analysts represent cyber threat information in a structured manner. STIX builds on "cyber observables," that is, operational cyber events or stateful properties such as registry keys, email, and network flow data, as defined in the Cyber Observable eXpression (CybOX) language. The Common Vulnerability Enumeration (CVE), Common Platform Enumeration (CPE), Common Weaknesses Enumeration (CWE), and Malware Attribute Enumeration and Characterization (MAEC) are also building blocks used within the STIX framework to capture standard vulnerability, platform, weakness, and malware information. The attacks seen can be specified using the Common Attack Pattern Enumeration and Classification (CAPEC). Furthermore, STIX indicator information can be used to generate queries to look for particular cyber observables, using the Open Vulnerability and Assessment Language (OVAL), the Open Indicators of Compromise (OpenIOC), SNORT rules, or YARA rules. |
||||
This website is sponsored and managed by The MITRE Corporation to enable stakeholder collaboration. Copyright © 2007–2024 The MITRE Corporation. MITRE, the MITRE logo, CVE, and the CVE logo are registered trademarks and the Making Security Measurable logo, CWE, the CWE logo, CAPEC, the CAPEC logo, MAEC, the MAEC logo, CWSS, the CWSS logo, CWRAF, the CWRAF logo, and Recommendation Tracker are trademarks of The MITRE Corporation. All other trademarks are the property of their respective owners. All other trademarks are the property of their respective owners. Contact us: measurablesecurity@mitre.org Page Last Updated: July 05, 2013 |