Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize...

24
DIGITAL FORENSIC RESEARCH CONFERENCE Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and Sean Barnum Presented At The Digital Forensic Research Conference DFRWS 2015 EU Dublin, Ireland (Mar 23 rd - 26 th ) DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners together in an informal environment. As a non-profit, volunteer organization, DFRWS sponsors technical working groups, annual conferences and challenges to help drive the direction of research and development. http:/dfrws.org

Transcript of Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize...

Page 1: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

DIGITAL FORENSIC RESEARCH CONFERENCE

Leveraging CybOX to Standardize Representation

and Exchange of Digital Forensic Information

By

Eoghan Casey, Greg Back, and Sean Barnum

Presented At

The Digital Forensic Research Conference

DFRWS 2015 EU Dublin, Ireland (Mar 23rd- 26th)

DFRWS is dedicated to the sharing of knowledge and ideas about digital forensics research. Ever since it organized

the first open workshop devoted to digital forensics in 2001, DFRWS continues to bring academics and practitioners

together in an informal environment. As a non-profit, volunteer organization, DFRWS sponsors technical working

groups, annual conferences and challenges to help drive the direction of research and development.

http:/dfrws.org

Page 2: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Leveraging CybOXTM to Standardize Representation and Exchange of Digital Forensic Information

DFAX: Digital Forensic Analysis eXpression

Eoghan Casey, Greg Back, Sean Barnum

Page 3: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Outline

■ Motivation ■ Related work ■ DFAX ontology ■ Introduce a Unified Cyber Ontology (UCO) ■ Using CybOX to represent digital evidence ■ Provenance ■ Actions, Action Patterns, Action Lifecycle ■ Next steps

Page 4: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Motivation

■ Share digital forensic information – Investigations involving 2+ jurisdictions/agencies

■ Share digital forensic knowledge

– Distinctive behavioral patterns to search for

■ Combine results from multiple forensic tools

■ Compare results from multiple forensic tools – Automate tool validation & verification

■ Structured data enables more advanced analysis

– high timelines, graph queries, behavioral analysis

Page 5: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

■ What is a Cyber Observable? – a measurable event or stateful property in the cyber domain – measurable events: registry key is created, file is deleted – stateful properties: MD5 hash of a file, value of a registry key

■ How these observables relate (patterns)

■ Actions (context and tool provenance)

■ Already used in digital forensics (intrusions, malware, IoC)

– Autopsy, Volatility

Page 6: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

■ Account ■ Address ■ API ■ Code ■ Device ■ Disk ■ Disk Partition ■ DNS Cache ■ DNS_Record ■ Email Message ■ File ■ GUI ■ GUI Dialog Box ■ GUI Window ■ Library ■ Linux Package ■ Memory ■ Mutex ■ Network Flow ■ Network Packet ■ Network Route Entry ■ Network Route ■ Network Subnet ■ Pipe ■ Port

■ Process ■ Product ■ Semaphore ■ Socket ■ System ■ Unix File ■ Unix Network Route Entry ■ Unix Pipe ■ Unix Process ■ Unix User Account ■ Unix Volume ■ URI ■ User Account ■ User Session ■ Volume ■ Win Computer Account ■ Win Critical Section ■ Win Driver ■ Win Event ■ Win Event Log ■ Win Executable File ■ Win File ■ Win Kernel ■ Win Kernel Hook ■ Win Handle

Page 5

Various Defined Object Schemas ■ Win Mailslot ■ Win Mutex ■ Win Pipe ■ Win Network Route Entry ■ Win Network Share ■ Win Pipe ■ Win Prefetch ■ Win Process ■ Win Registry Key ■ Win Semaphore ■ Win Service ■ Win System ■ Win System Restore ■ Win Task ■ Win Thread ■ Win User Account ■ Win Volume ■ Win Waitable Timer ■ X509 Certificate … (more on the way)

Page 7: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Email

.DOC file

Flash content

.MP4 downloader

.EXE trojan

C&C URLs/IPs

Attach

Execute

Download

Create

Execute

Connect

Open

Disk (Contains)

Registry

Create

Page 8: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Use Case: Detect Malicious Activity

Common Patterns of Attack (CAPEC) • Attack Flow Description

Cyber Observable Characterization (CybOX) • Events • Stateful Measures

Snort Rules

Yara Rules

CERE Rules

SIEM Rules

Einstein

Cyber Observable Characterization (CybOX) • Events • Stateful

Measures

Diverse Sensors

Page 9: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

STIX: Structured Threat Information eXpressions

Page 10: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Android Example

Page 9

Page 11: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Related Work

Digital Evidence

Bags (DEB) XIRAF RDF

Digital Evidence Exchange

(DEX)

Digital Forensic XML (DFXML) AFF4 DFAX

Turner, 2005 Alink et al,

2006 Schatz, 2007

Levine & Liberatore, 2009 Garfinkel, 2009

Cohen, et al 2009

Open Source (DHS/MITRE)

Open source Y N N/A Y Y Y Y

Case Information Y Y N N N Y Y

Integrity assurance Y Y Y Y Y Y Y

Chain of custody Y N P N N Y Y

Evidence details Y Y Y N N Y Y

Tool details Y Y Y Y Y Y Y

Storage media contents Y Y Y N Y Y Y

Mobile device contents Y Y N N N N Y Assign object multiple types Y Y Y N N Y Y Parent-child relationships Y Y Y Y Y N Y Non-hierarchical relationships N N Y N N Y Y

Actions N N Y N N N Y

Action Lifecycles N N N N N N Y Action Patterns N N N N N N Y

Page 12: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

DFAX Ontology

Page 13: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

DFAX Ontology

Page 14: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

DFAX Ontology

Page 15: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Digital Evidence in CybOX

■ Traces of wiping (Observable or Pattern)

<ProductObj:Product>Secure Delete</ProductObj:Product> <FileObj:File_Name>sdelete.exe</FileObj:File_Name> <cybox:Relationship>Characterizes</cybox:Relationship> <WinRegistryKeyObj:Key>Software\Sysinternal\SDelete</WinRegist <cybox:Relationship>Created</cybox:Relationship> <FileObj:File_Name condition="FitsPattern">Z+.Z+</FileObj:File_Name> <cybox:Relationship">Renamed_By</cybox:Relationship>

Page 16: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Provenance

■ Evidence source and handling – Continuity of possession / Chain of custody

■ Evidence processing

– Tools and transformations

■ Evidence analysis – Evaluation of source – Need to expand CybOX (e.g., PRNU and ENF)

Page 17: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Provenance in DFAX/CybOX

■ Evidence source and handling – dfax:Evidence Record

– dfax:Forensic Action

■ Evidence processing

– cyboxCommon:Tool

■ Evidence analysis – Defined relationships

Page 18: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Action Lifecycle: Forensic Process

■ Different groups define process differently Forensic Process 1 Forensic Process 2 Forensic Process 3 Forensic Process 4

Authorization

Planning Planning Preparation

Identification Identification Notification

Preservation Reconnaissance Search Incident Response

Collection Transport & Storage Collection Data Collection

Examination Transport

Analysis Analysis Storage Data Analysis

Presentation Proof and Defense Examination Presentation of Findings

Archive Storage Presentation

Proof/defense Incident Closure

Dissemination

Page 19: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Action Lifecycle: Subject

Grooming (Sexual Assault) Kill Chain (Intrusion) Victim selection Reconnaissance

Establish trust Development

Desensitization to sexual activity/abuse

Delivery

Maintain secrecy (persuasion/threats) Exploitation

Arrange meeting Configuration

Conceal evidence Beaconing and C2

Page 20: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Actions {Subject, Victim, System}

■ Action = USB Device Connected ■ Represent & search structured characteristics

FileObj:File_Name = setupapi.log IN

FileObj:File_Path = C:\Windows\setupapi.log CONTAINS

cyboxCommon:String_Value = “\DISK&VEN_KINGSTON&PROD_DATATRAVELER_3.0&REV_PMAP\8606E6D418ABE6077179

FAE&0] OR

WinRegistryKeyObj:Name = HardwareID IN

WinRegistryKeyObj:Hive = HKEY_LOCAL_MACHINE WinRegistryKeyObj:Key =  “\SYSTEM\CurrentControlSet\Enum\USBSTOR\

Disk&Ven_Kingston&Prod_DataTraveler_3.0&Rev_PMAP\08606E6D418ABE6077179FAE&0”

CONTAINS WinRegistryKeyObj:Data =  “USBSTOR\DiskKingstonDataTraveler_3.0PMAP”

Page 21: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Note: Plaso

■ Categorizes  related  “events”  using  “tags” – Plaso events map to cybOX:Observables – Plaso tags map to dfax:Actions

■ Plaso “Application  Execution”  tag  includes:

– windows:prefetch:execution – windows:lnk AND  path  contains  ‘.exe’ – winreg AND userassist or mru – winevt source = Security AND eventID = 592

Page 22: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Action Patterns

■ Higher level, human understandable terms – Reflect behaviors and objectives – Assist in establishing modus operandi (a.k.a. TTP)

Page 23: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Representing Changes

NIST Diskprint (before and after comparison) http://www.nsrl.nist.gov/dskprt/DPexample.html

■ CybOX Actions

– Install program – Execute program – Use program – Uninstall program

Page 24: Leveraging CybOX to Standardize Representation and ... · Leveraging CybOX to Standardize Representation and Exchange of Digital Forensic Information By Eoghan Casey, Greg Back, and

© 2015 The MITRE Corporation. All rights reserved.

Next steps

■ Community involvement – https://github.com/dfax/dfax

■ DFAX/CybOX Python library ■ Periodic Mobile Forensics

■ Plaso

■ Abstract concepts common across cyber domains

– Tools – Actions & Action Lifecycle