Cybox Intro Handout
Cybox Intro Handout
CybOX provides a common structure for representing cyber observables across and among the operational areas
of enterprise cyber security that improves the consistency, efficiency, and interoperability of deployed tools and
processes, as well as increases overall situational awareness by enabling the potential for detailed automatable
sharing, mapping, detection, and analysis heuristics.
Examples of cyber observables ■■ A file has a specific MD5 hash ■■ Application logs show
include: ■■ Data is sent to an address on a communication on certain ports
vendor uses its own unique approach that inhibits consistency, ■■ Operational event management
CybOX is a U.S. Department of Homeland Security–led effort of the office of Cybersecurity and
Communications. MITRE, operating as DHS’s FFRDC, manages the CybOX website, community
cybox.mitre.org engagement, and discussion lists to enable open and public collaboration with all stakeholders.
■■ Cyber situational awareness
Supported Use Case Relevant Process Domain Specific Standard
■■ Incident response
Analyze event data from diverse set of Event Management CybOX
■■ Indicator sharing sensors of different types and different
■■ Digital forensics vendors
■■ Etc. Detect malicious activity utilizing attack Attack Detection Common Attack Pattern Enumeration
patterns and Classification (CAPEC™)
Through utilization of the standardized
Detect malicious activity utilizing Attack Detection Malware Attribute Enumeration and
CybOX Language, relevant observable malware behavior characterizations Characterization (MAEC™)
events or properties can be captured and Enable automated attack detection Attack Detection CybOX, MAEC, CAPEC, STIX
shared, defined in indicators and rules, or signature rule generation
used to adorn the appropriate portions of Characterize malicious activity utilizing Incident Response/ CAPEC, STIX
attack patterns Management
attack patterns and malware profiles in or-
Identify new attack patterns Threat Characterization CAPEC
der to tie the logical pattern constructs to
Prioritize existing attack patterns based Security Testing and Secure CAPEC, STIX
real-world evidence of their occurrence or
on tactical reality Development
presence for attack detection and charac-
Characterize malware behavior Malware Analysis MAEC
terization. Incident response and manage-
Guide malware analysis utilizing attack Malware Analysis MAEC, CAPEC
ment can then take advantage of all of patterns
these capabilities to investigate occurring Detect malware effects Attack Detection and STIX, MAEC, Open Vulnerability and
incidents, improve overall situational Incident Response/ Assessment Language (OVAL®)
awareness and improve future attack de- Management
tection, prevention and response. Enable collaborative attack indicator Information Sharing STIX, TAXII
sharing
requiring the ability to deal with cyber Enable automatic application of Incident Response/ STIX
mitigations specified in attack patterns Management
observables. For most use cases, the utili-
Enable incident information sharing Incident Response/ STIX, Trusted Automated eXchange of
zation of CybOX should be indirect with Management Indicator Information (TAXII™)
primary focus on the use case domain- Support correlation between observed Digital Forensics STIX, MAEC, CAPEC, ongoing work to
specific standard or solution which lever- properties and malicious indicators as refine Digital Forensics XML (DFXML)
ages CybOX as an enabler. See table at part of digital forensics based on CybOX
right for examples of current use cases. Capture digital forensics analysis results Digital Forensics Ongoing work to refine DFXML based
on CybOX
Feedback Requested Capture digital forensics provenance Digital Forensics Ongoing work to refine DFXML based
information on CybOX
CybOX Community members can make Enable collaborative sharing of digital Digital Forensics Ongoing work to refine DFXML based
contributions to CybOX development forensics information on CybOX, STIX, TAXII
and manage issue tracking for the CybOX Enable explicit and implicit sharing Information Sharing STIX, CybOX, TAXII
schemas, utilities, specifications, and sup- controls for cyber observable
information
porting information by joining the CybOX
Enable new levels of meta-analysis on Cyber Situational CybOX, STIX
Community at https://cybox.mitre.org/
operational cyber observables Awareness
community/. Members of the cyber secu-
rity community are invited to participate
in this growing community effort.