-
Notifications
You must be signed in to change notification settings - Fork 418
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
Co-authored-by: Eric Beahan <eric.beahan@elastic.co>
- Loading branch information
Showing
3 changed files
with
379 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,162 @@ | ||
# 0015: Create the ELF sub-field of the File fieldset | ||
|
||
- Stage: **1 (draft)** | ||
- Date: **2021-02-10** | ||
|
||
Create the Executable Linkable Format (ELF) sub-field, of the `file` top-level fieldset. This document metadata can be used for malware research, as well as coding and other application development efforts. | ||
|
||
## Fields | ||
|
||
**Stage 0** | ||
|
||
This RFC is to create the ELF sub-field within the `file.` fieldset. This will include 25 sub-fields. | ||
|
||
| Name | Type | Description | | ||
| ---- | ---- | ----------- | | ||
| elf.creation_date | date | Extracted when possible from the file's metadata. Indicates when it was built or compiled. It can also be faked by malware creators. | | ||
| elf.exports | flattened | List of exported element names and types. | | ||
| elf.exports.name | keyword | Name of exported symbol | | ||
| elf.exports.type | keyword | Type of exported symbol | | ||
| elf.segments | nested | ELF object segment list. | | ||
| elf.segments.type | keyword | ELF object segment type. | | ||
| elf.segments.sections | keyword | ELF object segment sections. | | ||
| elf.header | group | Header information of the ELF file. | | ||
| elf.header.class | keyword | Header class of the ELF file. | | ||
| elf.header.data | keyword | Data table of the ELF header. | | ||
| elf.header.machine | keyword | Machine architecture of the ELF header. | | ||
| elf.header.os_abi | keyword | Application Binary Interface (ABI) of the Linux OS. | | ||
| elf.header.type | keyword | Header type of the ELF file. | | ||
| elf.header.version | keyword | Version of the ELF header. | | ||
| elf.header.abi_version | keyword | Version of the ELF Application Binary Interface (ABI). | | ||
| elf.header.entrypoint | long | Header entrypoint of the ELF file. | | ||
| elf.header.object_version | keyword | "0x1" for original ELF files. | | ||
| elf.imports | flattened | List of imported element names and types. | | ||
| elf.imports.name | keyword | Name of imported symbol | | ||
| elf.imports.type | keyword | Type of imported symbol | | ||
| elf.sections | nested | Section information of the ELF file. | | ||
| elf.sections.flags | keyword | ELF Section List flags. | | ||
| elf.sections.name | keyword | ELF Section List name. | | ||
| elf.sections.physical_offset | keyword | ELF Section List offset. | | ||
| elf.sections.type | keyword | ELF Section List type. | | ||
| elf.sections.physical_size | long | ELF Section List physical size. | | ||
| elf.sections.virtual_address | long | ELF Section List virtual address. | | ||
| elf.sections.virtual_size | long | ELF Section List virtual size. | | ||
| elf.sections.entropy | long | Shannon entropy calculation from the section. | | ||
| elf.sections.chi2 | long | Chi-square probability distribution of the section. | | ||
| elf.shared_libraries | keyword | List of shared libraries used by this ELF object | | ||
| elf.telfhash | keyword | telfhash hash for ELF files. | | ||
| elf.architecture | keyword | Machine architecture of the ELF file. | | ||
| elf.byte_order | keyword | Byte sequence of ELF file. | | ||
| elf.cpu_type | keyword | CPU type of the ELF file. | | ||
|
||
|
||
**Stage 1** | ||
|
||
[New `elf.yml` candidate](../schemas/elf.yml) | ||
|
||
<!-- | ||
Stage 3: Add or update all remaining field definitions. The list should now be exhaustive. The goal here is to validate the technical details of all remaining fields and to provide a basis for releasing these field definitions as beta in the schema. Use GitHub code blocks with yml syntax formatting. | ||
--> | ||
|
||
## Usage | ||
|
||
|
||
In performing file analysis, specifically for malware research, understanding file similarities can be used to chain together malware samples and families to identify campaigns and possibly attribution. Additionally, understanding how malware components are re-used is useful in understanding malware telemetry, especially in understanding the impact being made through the introduction of defensive countermeasures. | ||
|
||
As an example, if XDR vendors deploys a new malware model to defeat a specific type of ransomware and we start observing a change and/or relationship to the headers, import tables, libraries, etc of that malware family, we can make assumptions that the changes to the malware model are making an impact against the malware family. | ||
|
||
As another example, tracking file metadata for specific families is useful in predicting new campaigns if we see similar file metadata being used for new samples. [Example](https://www.bleepingcomputer.com/news/security/maze-ransomware-is-shutting-down-its-cybercrime-operation/), the Maze ransomware family shutting down and re-purposing as Egregor (this is for Windows malware, but the concept is the same). | ||
|
||
## Source data | ||
|
||
**Stage 1** | ||
|
||
This type of data can be provided by logs from VirusTotal, Reversing Labs, Lockheed Martin's LAIKABOSS, Emerson's File Scanning Framework, Target's Strelka, or other file/malware analysis platforms. | ||
|
||
* [VirusTotal Filebeat module PR](https://github.com/elastic/beats/pull/21815) | ||
* [VirusTotal API](https://developers.virustotal.com/v3.0/reference) | ||
* [Emerson FSF](https://github.com/EmersonElectricCo/fsf) | ||
* [Target Strelka](https://github.com/target/strelka) | ||
* [Lockheed Martin LAIKABOSS](https://github.com/lmco/laikaboss) | ||
|
||
<!-- | ||
Stage 1: Provide a high-level description of example sources of data. This does not yet need to be a concrete example of a source document, but instead can simply describe a potential source (e.g. nginx access log). This will ultimately be fleshed out to include literal source examples in a future stage. The goal here is to identify practical sources for these fields in the real world. ~1-3 sentences or unordered list. | ||
--> | ||
|
||
**Stage 2** | ||
|
||
### Real world examples | ||
|
||
<!-- | ||
Stage 2: Included a real world example source document. Ideally this example comes from the source(s) identified in stage 1. If not, it should replace them. The goal here is to validate the utility of these field changes in the context of a real world example. Format with the source name as a ### header and the example document in a GitHub code block with json formatting. | ||
--> | ||
|
||
<!-- | ||
Stage 3: Add more real world example source documents so we have at least 2 total, but ideally 3. Format as described in stage 2. | ||
--> | ||
|
||
## Scope of impact | ||
|
||
**Stage 2** | ||
|
||
There should be no breaking changes, depreciation strategies, or significant refactoring as this is creating a sub-field for the existing `file.` fieldset. | ||
|
||
While likely not a large-scale ECS project, there would be documentation updates needed to explain the new fields. | ||
|
||
<!-- | ||
Stage 2: Identifies scope of impact of changes. Are breaking changes required? Should deprecation strategies be adopted? Will significant refactoring be involved? Break the impact down into: | ||
* Ingestion mechanisms (e.g. beats/logstash) | ||
* Usage mechanisms (e.g. Kibana applications, detections) | ||
# https://github.com/elastic/ecs/tree/master/docs/usage#usage-docs | ||
* ECS project (e.g. docs, tooling) | ||
The goal here is to research and understand the impact of these changes on users in the community and development teams across Elastic. 2-5 sentences each. | ||
--> | ||
|
||
## Concerns | ||
|
||
<!-- | ||
Stage 1: Identify potential concerns, implementation challenges, or complexity. Spend some time on this. Play devil's advocate. Try to identify the sort of non-obvious challenges that tend to surface later. The goal here is to surface risks early, allow everyone the time to work through them, and ultimately document resolution for posterity's sake. | ||
--> | ||
|
||
<!-- | ||
Stage 2: Document new concerns or resolutions to previously listed concerns. It's not critical that all concerns have resolutions at this point, but it would be helpful if resolutions were taking shape for the most significant concerns. | ||
--> | ||
|
||
<!-- | ||
Stage 3: Document resolutions for all existing concerns. Any new concerns should be documented along with their resolution. The goal here is to eliminate the risk of churn and instability by resolving outstanding concerns. | ||
--> | ||
|
||
<!-- | ||
Stage 4: Document any new concerns and their resolution. The goal here is to eliminate risk of churn and instability by ensuring all concerns have been addressed. | ||
--> | ||
|
||
**ELF Imports** | ||
|
||
Type flattened won't allow explicit field mappings to be defined, so I don't think it's necessary to explicitly list them here. However, is there intent to still describe for data sources on how to "shape" the data for these flattened fields? There are no type: flattened fields today in ECS, so how to best capture provide that type of guidance will need to be hashed out. | ||
|
||
* Field: `elf.imports` | ||
* Comment: https://github.com/elastic/ecs/pull/1077#discussion_r572274291 | ||
|
||
|
||
## People | ||
|
||
The following are the people that consulted on the contents of this RFC. | ||
|
||
* @peasead | author | ||
* @devonakerr | sponsor | ||
* @dcode, @peasead | subject matter expert | ||
|
||
## References | ||
|
||
<!-- Insert any links appropriate to this RFC in this section. --> | ||
|
||
### RFC Pull Requests | ||
|
||
<!-- An RFC should link to the PRs for each of it stage advancements. --> | ||
|
||
* Stage 1: https://github.com/elastic/ecs/pull/1077 | ||
|
||
<!-- | ||
* Stage 1: https://github.com/elastic/ecs/pull/NNN | ||
... | ||
--> |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,19 @@ | ||
[[ecs-elf-ussage]] | ||
=== ELF Usage | ||
|
||
--Description-- | ||
|
||
[discrete] | ||
=== ELF Field Details | ||
| Field | Description | Level | | ||
| ---- | ---- | ----------- | | ||
| elf.creation_date | Extracted when possible from the file's metadata. Indicates when it was built or compiled. It can also be faked by malware creators. | extended | | ||
| ... | ... | ... | | ||
| ... | ... | ... | | ||
| ... | ... | ... | | ||
|
||
[discrete] | ||
=== Field Reuse | ||
The `elf` fields are expected to be nested at: `dll.elf`, `file.elf`, `process.elf`. | ||
|
||
Note also that the `elf` fields are not expected to be used directly at the root of the events. |
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,198 @@ | ||
--- | ||
- name: elf | ||
title: ELF Header | ||
group: 2 | ||
description: > | ||
These fields contain Linux Executable Linkable Format (ELF) metadata. | ||
type: group | ||
reusable: | ||
top_level: false | ||
expected: | ||
- file | ||
- process | ||
fields: | ||
- name: creation_date | ||
short: Build or compile date. | ||
description: > | ||
Extracted when possible from the file's metadata. Indicates when it was | ||
built or compiled. It can also be faked by malware creators. | ||
type: date | ||
level: extended | ||
|
||
- name: architecture | ||
description: > | ||
Machine architecture of the ELF file. | ||
type: keyword | ||
level: extended | ||
example: ARM, x86-64, etc | ||
|
||
- name: byte_order | ||
description: > | ||
Byte sequence of ELF file. | ||
type: keyword | ||
level: extended | ||
example: Little Endian, Big Endian | ||
|
||
- name: cpu_type | ||
description: > | ||
CPU type of the ELF file. | ||
type: keyword | ||
level: extended | ||
example: Intel, PowerPC, RISC, etc. | ||
|
||
- name: header.class | ||
description: > | ||
Header class of the ELF file. | ||
type: keyword | ||
level: extended | ||
|
||
- name: header.data | ||
description: > | ||
Data table of the ELF header. | ||
type: keyword | ||
level: extended | ||
|
||
- name: header.os_abi | ||
description: > | ||
Application Binary Interface (ABI) of the Linux OS. | ||
type: keyword | ||
level: extended | ||
|
||
- name: header.type | ||
description: > | ||
Header type of the ELF file. | ||
type: keyword | ||
level: extended | ||
|
||
- name: header.version | ||
description: > | ||
Version of the ELF header. | ||
type: keyword | ||
level: extended | ||
|
||
- name: header.abi_version | ||
type: keyword | ||
level: extended | ||
description: > | ||
Version of the ELF Application Binary Interface (ABI). | ||
- name: header.entrypoint | ||
format: string | ||
level: extended | ||
type: long | ||
description: > | ||
Header entrypoint of the ELF file. | ||
- name: header.object_version | ||
type: keyword | ||
level: extended | ||
description: > | ||
"0x1" for original ELF files. | ||
- name: sections | ||
description: > | ||
Section information of the ELF file. | ||
type: nested | ||
level: extended | ||
|
||
- name: sections.flags | ||
description: > | ||
ELF Section List flags. | ||
type: keyword | ||
level: extended | ||
|
||
- name: sections.name | ||
description: > | ||
ELF Section List name. | ||
type: keyword | ||
level: extended | ||
|
||
- name: sections.physical_offset | ||
description: > | ||
ELF Section List offset. | ||
type: keyword | ||
level: extended | ||
|
||
- name: sections.type | ||
description: > | ||
ELF Section List type. | ||
type: keyword | ||
level: extended | ||
|
||
- name: sections.physical_size | ||
description: > | ||
ELF Section List physical size. | ||
format: bytes | ||
type: long | ||
level: extended | ||
|
||
- name: sections.virtual_address | ||
description: > | ||
ELF Section List virtual address. | ||
format: string | ||
type: long | ||
level: extended | ||
|
||
- name: sections.virtual_size | ||
description: > | ||
ELF Section List virtual size. | ||
format: string | ||
type: long | ||
level: extended | ||
|
||
- name: sections.entropy | ||
description: > | ||
Shannon entropy calculation from the section. | ||
format: number | ||
type: long | ||
level: extended | ||
|
||
- name: sections.chi2 | ||
description: > | ||
Chi-square probability distribution of the section. | ||
format: number | ||
type: long | ||
level: extended | ||
|
||
- name: exports | ||
description: > | ||
List of exported element names and types. | ||
level: extended | ||
type: flattened | ||
|
||
- name: imports | ||
description: > | ||
List of imported element names and types. | ||
type: flattened | ||
level: extended | ||
|
||
- name: shared_libraries | ||
description: > | ||
List of shared libraries used by this ELF object | ||
type: keyword | ||
level: extended | ||
normalize: | ||
- array | ||
|
||
- name: telfhash | ||
short: telfhash hash for ELF files | ||
description: > | ||
telfhash is symbol hash for ELF files, just like imphash is imports hash for PE files. Learn more at https://github.com/trendmicro/telfhash. | ||
type: keyword | ||
level: extended | ||
|
||
- name: segments | ||
description: > | ||
ELF object segment list. | ||
type: nested | ||
level: extended | ||
|
||
- name: segments.type | ||
description: ELF object segment type. | ||
type: keyword | ||
level: extended | ||
|
||
- name: segments.sections | ||
description: ELF object segment sections. | ||
type: keyword | ||
level: extended |