Files
digital-forensics-lab/STIX_external_reference/readme.md
Frank Xu a2b63370d4 add stix
2021-01-26 14:39:16 -05:00

13 KiB

Cyber-observable Objects for Digital Forensics

The goal of the project is to create a list of customized STIX™ Cyber-observable Objects for facilitating digital forensic investigations. We follow the STIX specification for customizing objects. The most important rule to create a new object type:

  • The value of the type property in a Custom Object SHOULD start with “x-” followed by a source unique identifier (like a domain name with dots replaced by hyphens), a hyphen and then the name. For example, x-example-com-customobject.

Table of Contents (updating)

Windows Event Object

Type Name: x-windows-evt

Properties

Property Name Type Description
type (required) string The value of this property MUST be windows-security-evt.
id (required) identifier The ID of a secuity type.
log_name (required) enum The value of this property MUST come from the log-nam-enum enumeration.
logged_time (required) timestamp
source string
event_id integer
task_category string
computer string The name of the computer.
user_account_ref identifier The user account that is associated with the evewnt.
belongs_to_ref (required) identity The relation describes that event is a part of file or artifact (e.g., cache, memory).

Relationships

Source Relationship Type Target Description

Log Name Enumeration

Enumeration Name: log-name-enum

Vocabulary Value Description
application
security
setup
system
forwarded-events

Examples

{
  "type": "x-windows-evt",
  "spec_version": "2.1",
  "id": "x-windows-evt--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f",
  "log_name": "security",
  "logged_time": "2021-01-06T20:03:00.000Z",
  "source": "Microsoft Windows security auditing.",
  "event_id": "4624",
  "task_category ": "Logon",
  "computer": "ryzen3790-xu",
  "user_account_ref ": "user-account--68f0b7d5-f7ab-47d2-8773-739ceb1c11bb",
  "belongs_to_ref": "file--9460a8a8-6351-40bb-b5ad-18f3265bbf7a"
}

Browser History Event Object

Type Name: x-browser-history-evt

Properties

Property Name Type Description
type (required) string The value of this property MUST be browser-history.
id (required) identifier The ID of a browser history record.
url string
title string The title of a web page has been visited.
visit_time timestamp The last time visited.
visit_count integer The number of times visited
browser_name string The values for this property SHOULD come from the browser-name-ov open vocabulary.
browser_ref identifier The value type for this property SHOULD software.
file_requested_ref identifier The ID of the file the http requested.
user_account_ref identifier The user account that is associated with record.
belongs_to_ref (required) identifier The relation describes that event is a part of file or artifact (e.g., cache, memory).

Relationships

Source Relationship Type Target Description

Examples

{
  "type": "x-browser-history-evt",
  "spec_version": "2.1",
  "id": "x-browser-history-evt--8e2e2d2b-17d4-4cbf-938f-98ee46b3cd3f",
  "url": "https://www.ubalt.edu/cpa/undergraduate-majors-and-minors/majors/cyber-forensics/",
  "title": "B.S. in Cyber Forensics | University of Baltimore",
  "visit-time": "2021-01-06T20:03:22.000Z",
  "visit-count": 2,
  "browser_name": "chrome",
  "browser_ref": "software--db997c40-458d-4da6-a339-6eef90cf325e",
  "file_requested_ref ": "file--10624790-0e43-4498-89da-8979ab4215ae",
  "user_account_ref ": "user-account--68f0b7d5-f7ab-47d2-8773-739ceb1c11bb",
  "belongs_to_ref": "file--843f6a43-0603-4e0d-84a4-198386eecf4f"
}

Browser Name Open Vocabulary

Vocabulary Name: browser-name-ov

ocabulary Value Description
chrome Google chrome browser
ie Internet explore
edge Microsoft Edge
firefox Mozilla Firefox
safari Apple Safari
chromium Open source Chrome alternative
opera
maxthon
brave
360-secure 360 Secure Browser
tor
other

Plug and Play (PnP) Event Object

Type Name: x-pnp-evt

The Windows Kernel-Mode Plug (pnp) and Play Manager SDO represents an event recorded by Plug and Play Manager. PnP is a combination of hardware technology and software techniques that enables a PC to recognize when a device is added to the system. With PnP, the system configuration can change with little or no input from the user.

Properties

The completed log properties can be access Microsoft office docs- Format of a text log section body

Property Name Type Description
type (required) string The value of this property MUST be x-pnp-evt.
id (required) identifier The ID of a browser history record.
entry_prefix enum The values of this property MUST come from the message-type-ov enumeration.
time_stamp timestamp Indicates the system time when the logged event occurred.
event_category string Indicates the category of SetupAPI operation that made the log entry. MUST be one of predefined Event_category operation strings, e.g.device installation.
formatted_message string Contains the specific information that applies to the log entry.
belongs_to_ref (required) identifier The relation describes that event is a part of file or artifact (e.g., cache, memory), e.g., steupAPI.log

Message Type Vocabulary

Vocabulary Name: message-type-ov

ocabulary Value Description
error An Error message
warning An warning message
other-info Information message other than an error message or a warning message

Examples

{
  "type": "x-pnp-evt",
  "spec_version": "2.1",
  "id": "x-pnp-evt--58959aae-d1e0-4e12-a879-270efe33c6e3",
  "entry_prefix": "other-info",
  "time_stamp": "2021-01-06T20:03:22.000Z",
  "event_category": "device installation",
  "formatted_message ": "Device Install (Hardware initiated) - USB\\VID_0781&PID_5517\\4C5300124505311010593",
  "belongs_to_ref": "file--176353bd-b61d-4944-b0cd-0b98783c50b5"
}

threat-actor-type-ov external reference

Vocabulary Value Description
criminal-intellectual-property-theft An individual that intentionally deprives someone of his or her intellectual property
criminal-ransomware
criminal-business-email-compromise
criminal-identity-theft
criminal-spoofing-and-phishing
criminal-memory-laundry
insider-disgruntled-sabotage
insider-disgruntled-violence
insider-disgruntled-theft
insider-disgruntled-fraud
insider-disgruntled-espionage
insider-disgruntled-embarrassing
insider-disgruntled-harassing
illegal-possessor An individual that owns, produces, distributes illegal information and device.
online- predators An individual that makes sexual advances to minors.

references: