This page contains an alphabetized list of commonly characterized features - whether statically, dynamically, or manually identified in malware - along with their mappings to MAEC/Cyber Observable eXpression (CybOX™) object elements, the associated MAEC/CybOX types, the typical MAEC schema locations of the object elements (specified via a quasi-XPath like expression), and an explicit XML representation example. Note that all object elements are characterized through their Properties field, and that only the most commonly used object elements are listed for each feature (please refer to the applicable schemas for the complete lists).
File Attributes
MAEC/CybOX Object Elements
MAEC/CybOX Types
File/File_Name
File/File_Path
File/Size_In_Bytes
Typical MAEC Schema Locations
Description
MAEC_Package/Malware_Subjects/Malware_Subject/Malware_Subject/Malware_Instance_Object_Attributes
Used to capture information about a single file associated with a malware instance.
MAEC_Bundle/Malware_Instance_Object_Attributes
Used to capture information about a single file associated with a malware instance.
MAEC_Bundle/Actions/Action/Associated_Objects/Associated_Object
Used to capture information about a single file related to an Action associated with a malware instance.
MAEC_Bundle/Objects/Object
Used to capture information about a single file related to an Object associated with a malware instance, including an Object that represents some extracted feature (e.g., strings).
MAEC_Bundle/Collections/Action_Collections/Action_Collection/Action_List/Action/Associated_Objects/Associated_Object
Used to capture information about a single file related to an Action in an Action Collection.
MAEC_Bundle/Collections/Object_Collections/Object_Collection/Object_List/Object
Used to capture information about a single file related to an Object in an Object Collection.
MAEC/CybOX XML Representation Example
<cybox:Associated_Object id= "maec-example-obj-2" >
<cybox:Properties xsi:type= "WinExecFileObj:WindowsExecutableFileObjectType" >
<FileObj:File_Name> ws2help.PNF</FileObj:File_Name>
<FileObj:File_Path> C:\Documents and Settings\user\Local Settings\Application\Data</FileObj:Full_Path>
<FileObj:Size_In_Bytes> 196608</FileObj:Size_In_Bytes>
</cybox:Properties>
</cybox:Associated_Object>
File Attributes - Windows PE File Attributes
MAEC/CybOX Object Elements
MAEC/CybOX Types
Windows_Executable_File/Headers
Windows_Executable_File/PE_Checksum
Windows_Executable_File/Build_Information
Windows_Executable_File/Type
Typical MAEC Schema Locations
Description
MAEC_Package/Malware_Subjects/Malware_Subject/Malware_Subject/Malware_Instance_Object_Attributes
Used to capture information about a single Windows PE file associated with a malware instance.
MAEC_Bundle/Malware_Instance_Object_Attributes
Used to capture information about a single Windows PE file associated with a malware instance.
MAEC_Bundle/Actions/Action/Associated_Objects/Associated_Object
Used to capture information about a single Windows PE file related to an Action associated with a malware instance.
MAEC_Bundle/Objects/Object
Used to capture information about a single Windows PE file related to an Object associated with a malware instance, including an Object that represents some extracted feature (e.g., strings).
MAEC_Bundle/Collections/Action_Collections/Action_Collection/Action_List/Action/Associated_Objects/Associated_Object
Used to capture information about a single Windows PE file related to an Action in an Action Collection.
MAEC_Bundle/Collections/Object_Collections/Object_Collection/Object_List/Object
Used to capture information about a single Windows PE file related to an Object in an Object Collection.
MAEC/CybOX XML Representation Example
<maecBundle:Object id= "maec-example-obj-1" >
<cybox:Properties xsi:type= "WinExecFileObj:WindowsExecutableFileObjectType" >
<WinExecFileObj:Headers>
<WinExecFileObj:Optional_Header>
<WinExecFileObj:Major_Linker_Version> 06</WinExecFileObj:Major_Linker_Version>
<WinExecFileObj:Minor_Linker_Version> 00</WinExecFileObj:Minor_Linker_Version>
<WinExecFileObj:Base_Of_Code> 036418</WinExecFileObj:Base_Of_Code>
<WinExecFileObj:Subsystem> Windows_GUI</WinExecFileObj:Subsystem>
</WinExecFileObj:Optional_Header>
</WinExecFileObj:Headers>
<WinExecFileObj:Type> Executable</WinExecFileObj:Type>
</cybox:Properties>
</maecBundle:Object>
Hash - Fuzzy Hash
MAEC/CybOX Object Elements
MAEC/CybOX Types
File/Hashes/Hash/Type[xsi:type=”cyboxVocabs:HashNameVocab-1.0”]={hash name} (e.g., SSDEEP)
File/Hashes/Hash/Fuzzy_Hash_Value
Typical MAEC Schema Locations
Description
MAEC_Package/Malware_Subjects/Malware_Subject/Malware_Subject/Malware_Instance_Object_Attributes
Used to capture fuzzy hash information associated with a malware instance.
MAEC_Bundle/Malware_Instance_Object_Attributes
Used to capture fuzzy hash information associated with a malware instance.
MAEC_Bundle/Actions/Action/Associated_Objects/Associated_Object
Used to capture fuzzy hash information related to an Action associated with a malware instance.
MAEC_Bundle/Objects/Object
Used to capture fuzzy hash information related to an Object associated with a malware instance.
MAEC_Bundle/Collections/Action_Collections/Action_Collection/Action_List/Action/Associated_Objects/Associated_Object
Used to capture fuzzy hash information related to an Action in an Action Collection.
MAEC_Bundle/Collections/Object_Collections/Object_Collection/Object_List/Object
Used to capture fuzzy hash information related to an Object in an Object Collection.
MAEC/CybOX XML Representation Example
<maecPackage:Malware_Subject id= "maec-example-sub-2" >
<maecPackage:Malware_Instance_Object_Attributes>
<cybox:Properties xsi:type= "WinExecutableFileObj:WindowsExecutableFileObjectType" >
<FileObj:Hashes>
<cyboxCommon:Hash>
<cyboxCommon:Type xsi:type= "cyboxVocabs:HashNameVocab-1.0" > SSDEEP</cyboxCommon:Type>
<cyboxCommon:Fuzzy_Hash_Value> 768:McAQ8tPlH25e85Q2OiYpD08NvHmjJ97UfPMO47sekO:uN9M553OiiN/OJ9MM+e3</cyboxCommon:Fuzzy_Hash_Value>
</cyboxCommon:Hash>
</FileObj:Hashes>
</cybox:Properties>
</maecPackage:Malware_Instance_Object_Attributes>
</maecPackage:Malware_Subject>
Hash - Simple Hash
MAEC/CybOX Object Elements
MAEC/CybOX Types
File/Hashes/Hash/Type[xsi:type=”cyboxVocabs:HashNameVocab-1.0”]={hash name} (e.g., MD5)
File/Hashes/Hash/Simple_Hash_Value
Typical MAEC Schema Locations
Description
MAEC_Package/Malware_Subjects/Malware_Subject/Malware_Subject/Malware_Instance_Object_Attributes
Used to capture simple hash information associated with a malware instance.
MAEC_Bundle/Malware_Instance_Object_Attributes
Used to capture simple hash information associated with a malware instance.
MAEC_Bundle/Actions/Action/Associated_Objects/Associated_Object
Used to capture simple hash information related to an Action associated with a malware instance.
MAEC_Bundle/Objects/Object
Used to capture simple hash information related to an Object associated with a malware instance.
MAEC_Bundle/Collections/Action_Collections/Action_Collection/Action_List/Action/Associated_Objects/Associated_Object
Used to capture simple hash information related to an Action in an Action Collection.
MAEC_Bundle/Collections/Object_Collections/Object_Collection/Object_List/Object
Used to capture simple hash information related to an Object in an Object Collection.
MAEC/CybOX XML Representation Example
<maecPackage:Malware_Subject id= "maec-example-sub-1" >
<maecPackage:Malware_Instance_Object_Attributes>
<cybox:Properties xsi:type= "WinExecutableFileObj:WindowsExecutableFileObjectType" >
<FileObj:Hashes>
<cyboxCommon:Hash>
<cyboxCommon:Type xsi:type= "cyboxVocabs:HashNameVocab-1.0" > MD5</cyboxCommon:Type>
<cyboxCommon:Simple_Hash_Value> 32530b68d78e5bcbd73a138276f45490</cyboxCommon:Simple_Hash_Value>
</cyboxCommon:Hash>
</FileObj:Hashes>
</cybox:Properties>
</maecPackage:Malware_Instance_Object_Attributes>
</maecPackage:Malware_Subject>
HTTP Session
MAEC/CybOX Object Elements
MAEC/CybOX Types
HTTP_Session/HTTP_Request_Response/HTTP_Client_Request/ HTTP_Request_Line/HTTP_Method
HTTP_Session/HTTP_Request_Response/HTTP_Client_Request/ HTTP_Request_Line/Value
HTTP_Session/HTTP_Request_Response/HTTP_Client_Request/ HTTP_Request_Line/Version
HTTP_Session/HTTP_Request_Response/HTTP_Client_Request/ HTTP_Message_Body/Message_Body
Typical MAEC Schema Locations
Description
MAEC_Bundle/Actions/Action/Associated_Objects/Associated_Object
Used to capture information about a single HTTP session related to an Action associated with a malware instance.
MAEC_Bundle/Objects/Object
Used to capture information about a single HTTP session related to an Object associated with a malware instance.
MAEC_Bundle/Collections/Action_Collections/Action_Collection/Action_List/Action/Associated_Objects/Associated_Object
Used to capture information about a single HTTP session related to an Action in an Action Collection.
MAEC_Bundle/Collections/Object_Collections/Object_Collection/Object_List/Object
Used to capture information about a single HTTP session related to an Object in an Object Collection.
MAEC/CybOX XML Representation Example
<cybox:Associated_Object id= "maec-example-obj-1" >
<cybox:Properties xsi:type= "HTTPSessionObj:HTTPSessionObjectType" >
<HTTPSessionObj:HTTP_Request_Response>
<HTTPSessionObj:HTTP_Client_Request>
<HTTPSessionObj:HTTP_Request_Line>
<HTTPSessionObj:HTTP_Method datatype= "string" > POST</HTTPSessionObj:HTTP_Method>
<HTTPSessionObj:Value> http://www.dailyinfonews.net/reportdatas.php</HTTPSessionObj:Value>
<HTTPSessionObj:Version> HTTP/1.0</HTTPSessionObj:Version> </HTTPSessionObj:HTTP_Request_Line>
</HTTPSessionObj:HTTP_Client_Request>
</HTTPSessionObj:HTTP_Request_Response>
</cybox:Properties>
</cybox:Associated_Object>
Mutex
MAEC/CybOX Object Elements
MAEC/CybOX Types
Typical MAEC Schema Locations
Description
MAEC_Bundle/Actions/Action/Associated_Objects/Associated_Object
Used to capture the name of a single mutex related to an Action associated with a malware instance.
MAEC_Bundle/Objects/Object
Used to capture the name of a single mutex related to an Object associated with a malware instance.
MAEC_Bundle/Collections/Action_Collections/Action_Collection/Action_List/Action/Associated_Objects/Associated_Object
Used to capture the name of a single mutex related to an Action in an Action Collection.
MAEC_Bundle/Collections/Object_Collections/Object_Collection/Object_List/Object
Used to capture the name of a single mutex related to an Object in an Object Collection.
MAEC/CybOX XML Representation Example
<maecBundle:Action id= "maec-example-act-3" >
<cybox:Name xsi:type= "maecVocabs:SynchronizationActionNameVocab-1.0" > create mutex</cybox:Name>
<cybox:Associated_Objects>
<cybox:Associated_Object id= "maec-example-obj-3" >
<cybox:Properties xsi:type= "WinMutexObj:WindowsMutexObjectType" named= "true" >
<MutexObj:Name> redem-Mutex</MutexObj:Name>
</cybox:Properties>
<cybox:Association_Type xsi:type= "maecVocabs:ActionObjectAssociationTypeVocab-1.0" > output</cybox:Association_Type>
</cybox:Associated_Object>
</cybox:Associated_Objects>
</maecBundle:Action>
Packer Information
MAEC/CybOX Object Elements
MAEC/CybOX Types
File/Packer_List/Packer/Name
File/Packer_List/Packer/Version
File/Packer_List/Entry_Point
Typical MAEC Schema Locations
Description
MAEC_Package/Malware_Subjects/Malware_Subject/Malware_Subject/Malware_Instance_Object_Attributes
Used to capture information about a single packer associated with a malware instance.
MAEC_Bundle/Malware_Instance_Object_Attributes
Used to capture information about a single packer associated with a malware instance.
MAEC_Bundle/Actions/Action/Associated_Objects/Associated_Object
Used to capture information about a single packer related to an Action associated with a malware instance.
MAEC_Bundle/Objects/Object
Used to capture information about a single packer related to an Object associated with a malware instance.
MAEC_Bundle/Collections/Action_Collections/Action_Collection/Action_List/Action/Associated_Objects/Associated_Object
Used to capture information about a single packer related to an Action in an Action Collection.
MAEC_Bundle/Collections/Object_Collections/Object_Collection/Object_List/Object
Used to capture information about a single packer related to an Object in an Object Collection.
MAEC/CybOX XML Representation Example
<maecPackage:Malware_Subject id= "maec-example-sub-1" >
<maecPackage:Malware_Instance_Object_Attributes>
<cybox:Properties xsi:type= "WinExecFileObj:WindowsExecutableFileObjectType" >
<FileObj:Packer_List>
<FileObj:Packer>
<FileObj:Name> UPX</FileObj:Name>
<FileObj:Signature> UPX v3.0.2</FileObj:Signature>
</FileObj:Packer>
</FileObj:Packer_List>
</cybox:Properties>
</maecPackage:Malware_Instance_Object_Attributes>
</maecPackage:Malware_Subject>
Process
MAEC/CybOX Object Elements
MAEC/CybOX Types
Process/Name
Process/Image_Info/Path
Typical MAEC Schema Locations
Description
MAEC_Bundle/Actions/Action/Associated_Objects/Associated_Object
Used to capture information about a single process related to an Action associated with a malware instance.
MAEC_Bundle/Objects/Object
Used to capture information about a single process related to an Object associated with a malware instance.
MAEC_Bundle/Process_Tree/Root_Process
Used to capture information about the root process of a process tree.
MAEC_Bundle/Process_Tree/Root_Process/Injected_Process
Used to capture information about a single process that was injected by the root process of a process tree.
MAEC_Bundle/Process_Tree/Root_Process/Spawned_Process
Used to capture information about a single child process spawned by the root process of a process tree.
MAEC_Bundle/Collections/Action_Collections/Action_Collection/Action_List/Action/Associated_Objects/Associated_Object
Used to capture information about a single process related to an Action in an Action Collection.
MAEC_Bundle/Collections/Object_Collections/Object_Collection/Object_List/Object
Used to capture information about a single process related to an Object in an Object Collection.
MAEC/CybOX XML Representation Example
<maecBundle:Action id= "maec-example-act-4" >
<cybox:Name xsi:type= "maecVocabs:ProcessMemoryActionNameVocab-1.0" > allocate process virtual memory</cybox:Name>
<cybox:Associated_Objects>
<cybox:Associated_Object id= "maec-example-obj-4" >
<cybox:Properties xsi:type= "WinProcessObj:WindowsProcessObjectType" >
<ProcessObj:Name> services.exe</ProcessObj:Name>
<ProcessObj:Image_Info>
<ProcessObj:Path> %System%\services.exe</ProcessObj:Path>
</ProcessObj:Image_Info>
</cybox:Properties>
<cybox:Association_Type xsi:type= "maecVocabs:ActionObjectAssociationTypeVocab-1.0" > output</cybox:Association_Type>
</cybox:Associated_Object>
</cybox:Associated_Objects>
</maecBundle:Action>
Registry Key Attributes
MAEC/CybOX Object Elements
MAEC/CybOX Types
WinRegistryKeyObj/Key
WinRegistryKeyObj/Hive
WinRegistryKeyObj/Values/Value/Name
WinRegistryKeyObj/Values/Value/Data
Typical MAEC Schema Locations
Description
MAEC_Bundle/Actions/Action/Associated_Objects/Associated_Object
Used to capture attributes of a single registry key related to an Action associated with a malware instance.
MAEC_Bundle/Objects/Object
Used to capture attributes of a single registry key related to an Object associated with a malware instance.
MAEC_Bundle/Collections/Action_Collections/Action_Collection/Action_List/Action/Associated_Objects/Associated_Object
Used to capture attributes of a single registry key related to an Action in an Action Collection.
MAEC_Bundle/Collections/Object_Collections/Object_Collection/Object_List/Object
Used to capture attributes of a single registry key related to an Object in an Object Collection.
MAEC/CybOX XML Representation Example
<cybox:Associated_Object>
<cybox:Properties xsi:type= "WinRegistryKeyObj:WindowsRegistryKeyObjectType" >
<WinRegistryKeyObj:Key> Software\Microsoft\Windows\CurrentVersion\Run</WinRegistryKeyObj:Key>
<WinRegistryKeyObj:Hive> HKEY_CURRENT_USER</WinRegistryKeyObj:Hive>
<WinRegistryKeyObj:Values>
<WinRegistryKeyObj:Value>
<WinRegistryKeyObj:Name> Zcxaxz</WinRegistryKeyObj:Name>
<WinRegistryKeyObj:Data> %AppData%\Zcxaxz.exe</WinRegistryKeyObj:Data>
</WinRegistryKeyObj:Value>
</WinRegistryKeyObj:Values>
</cybox:Properties>
</cybox:Associated_Object>
Universal Resource Indicator (URI)
MAEC/CybOX Object Elements
MAEC/CybOX Types
Typical MAEC Schema Locations
Description
MAEC_Package/Malware_Subjects/Malware_Subject/Malware_Subject/Malware_Instance_Object_Attributes
Used to capture a single URI associated with a malware instance.
MAEC_Bundle/Malware_Instance_Object_Attributes
Used to capture a single URI associated with a malware instance.
MAEC_Bundle/Actions/Action/Associated_Objects/Associated_Object
Used to capture a single URI related to an Action associated with a malware instance.
MAEC_Bundle/Objects/Object
Used to capture a single URI related to an Object associated with a malware instance.
MAEC_Bundle/Collections/Action_Collections/Action_Collection/Action_List/Action/Associated_Objects/Associated_Object
Used to capture a single URI related to an Action in an Action Collection.
MAEC_Bundle/Collections/Object_Collections/Object_Collection/Object_List/Object
Used to capture a single URI related to an Object in an Object Collection.
MAEC/CybOX XML Representation Example
<maecBundle:Malware_Instance_Object_Attributes>
<cybox:Properties xsi:type= "URIObj:URIObjectType" >
<URIObj:Value> http://samsonikonyou.ru:8080/navigator/jueoaritjuir.php</URIObj:Value>
</cybox:Properties>
</maecBundle:Malware_Instance_Object_Attributes>