center-for-threat-informed-defense / attack-flow

Attack Flow helps executives, SOC managers, and defenders easily understand how attackers compose ATT&CK techniques into attacks by developing a representation of attack flows, modeling attack flows for a small corpus of incidents, and creating visualization tools to display attack flows.
https://ctid.io/attack-flow
Apache License 2.0
521 stars 83 forks source link

Schemas for Forensic Tools to Create a Common Operating Picture #41

Open jvossler opened 2 years ago

jvossler commented 2 years ago

It would be useful to be able to have pre-built schemas for common tool outputs, such as from Volatility modules, Eric Zimmerman's suite of tools, popular open-source forensics tools (AmcacheParser, appcompatprocessor.py, etc...) frameworks (like Kansa PowerShell IR Framework, etc...), and suites (Sysinternals Suite [Autorunsc.exe, Sysmon, etc...]). The schemas would allow for the forensic outputs to marry together on one graph database, which would be SUPER useful. Instead of endless spreadsheets to cipher through, an ability to aggregate the data into one common operating picture would take forensics analysis to another level.

Obviously, there would be a ton of links and nodes (and associated attributres!), but that is for the end user to figure out in terms of processing. I for one think that is a good problem to have and a tremendous step in the right direction.

mehaase commented 2 years ago

Integration and automation are definitely major goals for this project, so I love the idea. I'm not clear on the execution, though. It would be great if you could describe a more specific task, e.g. "ingest volatility output and map it to X,Y,Z elements in Attack Flow". Some examples of inputs and expected outputs would be useful. More details == more likely we can act on it.

CDSRV commented 2 years ago

one goal of this work: https://github.com/CDSRV/ops-ontology