Friday 2 October 14:00 - 14:30, Red room
Desiree Beck (MITRE)
The Malware Behavior Catalog (MBC) is a publicly available framework defining behaviours and code characteristics to support malware analysis-oriented use cases, such as tagging, provenance and similarity analysis, and standardized reporting.
As a malware-centric extension of the MITRE ATT&CK^TM knowledge base, MBC draws upon ATT&CK’s success by applying its philosophy and methodology to malware. Namely, MBC maintains a malware, code-oriented perspective, focuses on real-world use of behaviours through empirical malware examples, and sustains a level of abstraction appropriate for supporting malware analysis use cases. (There is no formal relationship between ATT&CK and MBC.)
MBC references existing ATT&CK techniques whenever applicable and also defines its own set of new, malware-focused behaviours as needed, most notably for malware anti-analysis behaviours. These anti-behavioural and anti-static analysis behaviours are key to effectively capturing malware analysis information. Example anti-analysis behaviours include debugger detection, dynamic analysis evasion, and executable code obfuscation.
The presentation will focus on how MBC supports standardized reporting, enabling consistent interpretation of behaviour analysis data to improve detection, mitigation and remediation. We will show how behaviour indicators identified by static and dynamic analysis tools can be mapped into MBC, drawing upon our recent mapping of signatures from the Cuckoo Sandbox community repository. We will also discuss how MBC content is available in a JSON-based STIX 2.1 format, making MBC machine-readable and accessible. Example analysis reports will illustrate the depth and precision MBC provides.
Desiree Beck Desiree Beck is a principal cybersecurity engineer at the MITRE Corporation where her work focuses on the research and development of malware analysis tools and techniques. She leads the Malware Behavior Catalog (MBC) project and supports the Structured Threat Information Expression (STIX) and Malware Enumeration Attribution and Characterization (MAEC) efforts. |
Dr. Nirmal Singh (Zscaler)
Deepen Desai (Zscaler)
Avinash Kumar (Zscaler)