INCH P. Cain
Internet-Draft The Cooper-Cain Group
Expires: December 24, 2005 D. Jevans
The Anti-Phishing Working Group
June 22, 2005
Extension to IODEF-Document Class for Phishing, Fraud, and Other Non-
Network Layer Reports
draft-ietf-inch-phishingextns-00
Status of this Memo
By submitting this Internet-Draft, each author represents that any
applicable patent or other IPR claims of which he or she is aware
have been or will be disclosed, and any of which he or she becomes
aware will be disclosed, in accordance with Section 6 of BCP 79.
Internet-Drafts are working documents of the Internet Engineering
Task Force (IETF), its areas, and its working groups. Note that
other groups may also distribute working documents as Internet-
Drafts.
Internet-Drafts are draft documents valid for a maximum of six months
and may be updated, replaced, or obsoleted by other documents at any
time. It is inappropriate to use Internet-Drafts as reference
material or to cite them other than as "work in progress."
The list of current Internet-Drafts can be accessed at
http://www.ietf.org/ietf/1id-abstracts.txt.
The list of Internet-Draft Shadow Directories can be accessed at
http://www.ietf.org/shadow.html.
This Internet-Draft will expire on December 24, 2005.
Copyright Notice
Copyright (C) The Internet Society (2005).
Abstract
This document extends the INCH XML incident reporting format for
reporting phishing, fraud, widespread spam, and other non-network
layer attacks and incidents. The extensions are an outgrowth of the
Anti-Phishing Working Group (APWG) activities in data collection and
sharing. Although we use the term "phishing attack", the data format
extensions are flexible enough to support information gleaned from
Cain & Jevans Expires December 24, 2005 [Page 1]
Internet-Draft IODEF Fraud Report Extensions June 2005
activities throughout the entire phishing life cycle and extensible
enough to be used for other types of electronic crime incidents such
as fraud. The extensions support very simple reporting as well as
optional fields for detailed, forensic reports and supports single
phish/fraud incidents as well as consolidated reports of multiple
phish incidents.
RFC 2129 Keywords
The key words "MUST", "MUST NOT", "REQUIRED", "SHALL", "SHALL NOT",
"SHOULD", "SHOULD NOT", "RECOMMENDED", "MAY", and "OPTIONAL" in this
document are to be interpreted as described in[RFC2119].
Cain & Jevans Expires December 24, 2005 [Page 2]
Internet-Draft IODEF Fraud Report Extensions June 2005
Table of Contents
1. Introduction . . . . . . . . . . . . . . . . . . . . . . . . 4
1.1 Why a Common Report Format is Needed . . . . . . . . . . . 4
1.2 Relation to the INCH IODEF Data Model . . . . . . . . . . 5
2. The Elements of Phishing/Fraud Activity . . . . . . . . . . 7
3. Fraud Actvitiy Reporting via an IODEF-Document Incident . . 8
4. PhraudReport Element Definitions . . . . . . . . . . . . . . 10
4.1 Version parameter . . . . . . . . . . . . . . . . . . . . 10
4.2 Identifying A Fraud campaign . . . . . . . . . . . . . . . 11
4.3 FraudedBrandName Element . . . . . . . . . . . . . . . . . 13
4.4 The Data Collection Site Element (DCSite) . . . . . . . . 13
4.5 OriginatingSensor Element . . . . . . . . . . . . . . . . 14
4.6 TakeDownInfo Element . . . . . . . . . . . . . . . . . . . 16
4.7 ArchivedData Element . . . . . . . . . . . . . . . . . . . 17
4.8 RelatedData Element . . . . . . . . . . . . . . . . . . . 18
4.9 CorrelationData Element . . . . . . . . . . . . . . . . . 18
4.10 PRComments Element . . . . . . . . . . . . . . . . . . . 18
4.11 EmailRecord Element . . . . . . . . . . . . . . . . . . 18
5. IODEF Required Elements . . . . . . . . . . . . . . . . . . 20
5.1 Fraud or Phishing Report . . . . . . . . . . . . . . . . . 20
5.2 Wide-Spread Spam Report . . . . . . . . . . . . . . . . . 21
5.3 Guidance on Usage . . . . . . . . . . . . . . . . . . . . 22
6. Security Considerations . . . . . . . . . . . . . . . . . . 23
7. IANA Considerations . . . . . . . . . . . . . . . . . . . . 24
8. Contributors . . . . . . . . . . . . . . . . . . . . . . . . 25
9. Normative References . . . . . . . . . . . . . . . . . . . . 25
Authors' Addresses . . . . . . . . . . . . . . . . . . . . . 25
A. Phishing Extensions XML Schema . . . . . . . . . . . . . . . 26
B. Phishing Extensions XML DTD . . . . . . . . . . . . . . . . 33
C. Examples of Complete Fraud Activity Reports . . . . . . . . 34
C.1 Sample Phish/Malware Email Report . . . . . . . . . . . . 34
C.2 Received Email . . . . . . . . . . . . . . . . . . . . . . 34
C.3 Generated Report . . . . . . . . . . . . . . . . . . . . . 34
D. Sample Spam Report . . . . . . . . . . . . . . . . . . . . . 37
Intellectual Property and Copyright Statements . . . . . . . 38
Cain & Jevans Expires December 24, 2005 [Page 3]
Internet-Draft IODEF Fraud Report Extensions June 2005
1. Introduction
Deception activities, such as Phishing and fraud, are an expanding
attack types in the Internet. For this document we use the two terms
interchangeably and characterize both attack types as broadly-
launched social engineering attacks in which an electronic identity
is misrepresented in an attempt to trick individuals into revealing
their personal credentials ( e.g., passwords, account numbers,
personal information, ATM PINs). A successful phishing attack on an
individual allows the phisher (i.e., attacker) to exploit the
individual's credentials for gain. Early phishing attacks were
directed at individuals via email as a ruse from a bank security
department, requesting the user's ATM number and PIN. Once phished,
the bank account could be used by the phisher to perpetrate
additional fraud, money laundering, or plain emptying of the account.
As individuals become aware of phishing tactics, the phishers have
evolved into using more complex and stealthier technologies, and have
targeted institutions other than banks. Other miscreants are also
using these same techniques for other types of attacks.
1.1 Why a Common Report Format is Needed
The rise in phishing and fraud activities via e-mail, instant
message, DNS corruption, and malicious code insertion has driven
corporations, Internet Service Providers, consumer agencies, and
financial institutions to begin to collect and correlate phishing
attack information to better plan out mitigation activities and to
assist in prosecution. Early on it became obvious that a common
format for the data reported or exchanged between these parties was
necessary and the IETF INCH XML format was selected for this use.
Although originally designed for network-layer incident sharing
(e.g., DoS attacks, compromised computers) the INCH format can be
extended quite easily to support other incident profiles, as we have
done.
The use of a common format will also help organizations integrate
multiple product outputs into a cohesive single attack view and will
allow for the introduction of advanced services such as wholly
automatic local notifications and usable data mining.
The accumulation and correlation of information is very important
when dealing with security incidents. In phishing attacks the source
of the attack may be forged and it's quite possible that the targeted
organization may not even be aware of the ongoing attack. Parties
aware of the attack may wish to notify the target, or an
organization's internal monitoring systems may detect the attack and
wish to take mitigation steps. Unfortunately, there is no recognized
standard way of expressing the detection of a phishing attack nor an
Cain & Jevans Expires December 24, 2005 [Page 4]
Internet-Draft IODEF Fraud Report Extensions June 2005
acceptable way to exchange the required information. For an
organization that employs multi anti-phishing technologies,
correlating data from multiple vendors or products is close to
impossible as the data is reported in multiple, mostly incompatible,
formats.
This document defines a data format that is used to capture relevant
information from a phishing attack and shared, correlated, or to
populate a database. Additionally, the use of products that export
information in this format will allow an organization to correlate
and analyze phishing information across their organization, in effect
information sharing with themselves. Although targeted at both the
accumulation of phishing attack information from a single institution
and a means of sharing attack information between cooperating
parties, the actual information sharing process and related political
challenges are not covered in this document.
1.2 Relation to the INCH IODEF Data Model
Instead of defining report format and language from scratch, the
phishing activities information is encoded as an extension to the
INCH incident exchange format.[INCH]The use of an already existent
and operational format allows for quicker vendor adoption and reuse
of existing tools in organizations. To reduce duplication and to be
compatible with modifications to the base IODEF definitions, this
document only identifies additional structures; The reader is
expected to have a copy of the IODEF documents handy while reading
this one.
One criticism of the INCH format is that it is too cumbersome (large
and complex) to be used in an efficient manner for something as
simple as fraud events. The goal of all common formatting is to be
efficient when necessary and also to allow enough data to be included
to provide a complete picture of the event. The INCH format has very
few required elements to allow for efficiency, but allows extremely
verbose elements to be used if supporting data is available. This
flexibility allows the INCH formats to be used in a wide range of
event reports but allows the product developer to only be required to
support one format standard.
1.2.1 The INCH Extensions for Fraud
In general, an INCH incident report contains detailed incident-
specific data which populates an EventData Structure. That data is
then incorporated, either singularly or in aggregation, with
additional summary and contact data, into an Incident structure. The
populated Incident structure is what is reported as a Fraud Activity
Report.
Cain & Jevans Expires December 24, 2005 [Page 5]
Internet-Draft IODEF Fraud Report Extensions June 2005
Unsavory phishing activity may include multiple email messages,
attacks, or events, scattered over various times, locations, and
methodologies. As each of these activities may generate multiple
reports to an incident team, the Fraud Activity Report is composed of
one XML Incident element, recording one or more individual phishing
events and may include multiple EventData elements.
This document defines new attributes for the EventData and Record
Item IODEF XML elements, then identifies attributes that are required
in a compliant Fraud Activity Report. The Appendices contain sample
Fraud Activity Reports and the complete Document Type Definition.
The IODEF Extensions defined in this document comply with section4,
"Extending the IODEF Format" in [INCH].
Cain & Jevans Expires December 24, 2005 [Page 6]
Internet-Draft IODEF Fraud Report Extensions June 2005
2. The Elements of Phishing/Fraud Activity
+-----------+ +------------------+
| Fraudster |<---<-- | Collection Point | <---O--<----<----+
+----+------+ +------------------+ | |
^ | |
| +--|-----+ ^
| | Sensor | Credentials
| +-|------+ |
| +---------------+ | +-------+
\--->---| Attack Source |--Phish-->-----O------> | User/ |
+---------------+ |Victim |
+-------+
Internet-based Phishing and Fraud activities are normally comprised
of at least four components.
1. The Fraudster, or the party perpetrating the fraudulent activity.
Most times this party is not readily identifiable.
2. The Attack Source, where the phishing email, virus, trojan, or
other attack is generated.
3. The User or intended target of the fraud/phish.
4. The collection point, where the victim sends their credentials or
personal data if they have been duped by the phisher.
If we take a holistic view of the attack, there are some additional
components:
5. The network sensor, which is some thing that detects the fraud/
phish attempt or success. This element may be an Intrusion-Detection
System, Firewall, Filter, email gateway, or even a human.
6. A forensic or archive site where an investigator has copied or
otherwise retained the data used for the fraud attempt or credential
collection.
Cain & Jevans Expires December 24, 2005 [Page 7]
Internet-Draft IODEF Fraud Report Extensions June 2005
3. Fraud Actvitiy Reporting via an IODEF-Document Incident
A Fraud Activity Report is an instance of a IODEF-Document XML
Incident element[INCH] with added EventData and AdditionalData
elements. Some required information with many optional items are
populated into the new structure to form a Fraud Activity Report. To
facilitate completeness, the report originator should fill out as
much as possible of the optional Incident element fields, but SHALL
stay consistent with the IODEF-Document structure.
This document defines new EventData IODEF XML elements; then
identifies attributes that are required in a compliant Fraud Activity
Report. The Appendices contain sample Fraud Activity Reports and the
complete XML Document Type Definition and schema.
The Incident element with fraud extensions is summarized below and
provides a standardized representation for commonly exchanged
incident data and associates a CSIRT assigned unique identifier with
the described activity.
+------------------+
| Incident |
+------------------+
| ENUM purpose |<>----------[ IncidentID ]
| ENUM restriction |<>--{0..1}--[ AlternativeID ]
| |<>--{0..1}--[ RelatedActivity ]
| |<>--{0..*}--[ Description ]
| |<>--{1..*}--[ Assessment ]
| |<>--{0..*}--[ Method ]
| |<>--{0..1}--[ DetectTime ]
| |<>--{0..1}--[ StartTime ]
| |<>--{0..1}--[ EndTime ]
| |<>----------[ ReportTime ]
| |<>--{1..*}--[ Contact ]
| |<>--{0..*}--[ Expectation ]
| |<>--{0..1}--[ History ]
| |<>--{0..*}--[ EventData ]
| | --> AdditionalData ]
| | --> PhraudReport (added)
+------------------+
Figure 1. The INCH XML Incident Element (modified)
A Fraud Activity Report is composed of one INCH Incident element,
containing one or more EventData elements that contain one or more
PhraudReport elements. This document defines the FraudReport element
for the INCH Incident.EventData.AdditionalData element comprising of
phishing and fraud-related information that does not map to existing
Cain & Jevans Expires December 24, 2005 [Page 8]
Internet-Draft IODEF Fraud Report Extensions June 2005
Incident or EventData attributes. We also define some additional
attributes in the INCH Incident.EventData element to capture
electronic mail header and routing information.
One Incident report may contain information on multiple incidents.
After the report identification information listed in the Incident
element, each individual event is detailed within a single EventData
structure.
Cain & Jevans Expires December 24, 2005 [Page 9]
Internet-Draft IODEF Fraud Report Extensions June 2005
4. PhraudReport Element Definitions
A PhraudReport consists of an Extension to the Incident
AdditionalData Element. The elements of the PhraudReport will
identify and capture information related to the four components of a
fraud activity. Other forensic information and commentary can be
added by the reporter as necessary to show relation to other events,
the output of an investigation, or for archival purposes. A
PhraudReport element is structured as follows.
+--------------------------+
| EventData.AdditionalData |
+--------------------------+
| ENUM type (9 = xml) |<>---------[ PhraudReport ]
| STRING meaning (xml) |
+--------------------------+
+-----------------+
| PhraudReport |
+-----------------+
| ENUM Version |<>--(0..*)--[ PhishNameRef ]
| ENUM FraudType |<>--(0..*)--[ PhishNameLocalRef ]
| |<>--(0..*)--[ FraudParameter ]
| |<>--(0..*)--[ FraudedBrandName ]
| |<>--(0..*)--[ LureSource ]
| |<>--(0..*)--[ OriginatingSensor ]
| |<>--(0..1)--[ EmailRecord ]
| |<>--(0..*)--[ DCSite ]
| |<>--(0..*)--[ TakeDownInfo ]
| |<>--(0..*)--[ ArchivedData ]
| |<>--(0..*)--[ RelatedData ]
| |<>--(0..*)--[ CorrelationData ]
| |<>--(0..1)--[ PRComments ]
+-----------------+
Figure 2. The PhraudReport Extensions to the INCH XML
Incident.AdditionalData Element
The components of a FraudReport are introduced in functional grouping
as some parameters are related and some elements may not make sense
stand-alone.
4.1 Version parameter
STRING. The version shall be the value 1.0 to be compliant with this
document.
Cain & Jevans Expires December 24, 2005 [Page 10]
Internet-Draft IODEF Fraud Report Extensions June 2005
4.2 Identifying A Fraud campaign
At times it may be useful to identify a specific phish or fraud for
future analysis -- much like the Anti-Virus Vendors identify certain
viruses. A specific phish/fraud can be identified using a
combination of the FraudType, FraudParameter, and PhishRefName
elements.
4.2.1 FraudType Parameter
ENUM. The FraudType attribute contains a number representing the
type of fraud attempted. The Email element has been separated into
multiple numbers to support the primary types of email.
1. PhishEmail, and the FraudParameter is the email subject line of
the phishing email. This type is a standard email phish, usually
sent as spam, and is intended to derive financial loss to the
recipient.
2. RecruitEmail, and the FraudParameter is the email subject line of
the phishing email. This type of email phish does not pose a
potential financial loss to the recipient, but covers other cases of
the phish and fraud lifecycle.
3. MalwareEmail, and the FraudParameter is the email subject line of
the phishing email. This type of email phish does not pose a
potential financial loss to the recipient, but lures the recipient to
an infected site.
4. Fraudsite, no FraudParameter. This identifies a known fraudulent
site that does not necessarily send spam lures.
5. DNSspoof, with the malware name as a parameter. This is used for
a spoofed DNS (e.g., malware changes localhost file so visits to
www.example.com go to another IP address).
6. Keylogger, with the malware name as the FraudParameter.
7. OLE, no parameter. This identifies background OLE information.
8. IM. The subject line parameter may be the malicious link
supplied to the user.
9. CVE, with the CVEnumber as the FraudParameter.
10. SiteArchive, with the data archived from the phishing server
placed in the ArchiveInfo element.
Cain & Jevans Expires December 24, 2005 [Page 11]
Internet-Draft IODEF Fraud Report Extensions June 2005
11. Spamreport.
12. Unknown.
When a FraudParameter is required, it is one of the following values:
SubjectLine element
STRING. This is the subject line of the email lure.Note that
some phishers add a number of random characters onto the end of a
phish email subject line for uniqueness; reporters should delete
those characters before insertion into the PhishParameter field.
MalwareName element
STRING. This is the name of the malware that installed the
keylogger or DNSspoofer.
CVENumber element
STRING. This is the CVEidentifier of this exploit used to phish.
4.2.2 LureSource Element
SOURCE. Many times the phishing, spam, or fraud lure email is
received from a spoofed IP address. If the real IP Address can be
ascertained it should be populated into this field. A spoofed
address may aso be entered, but the spoofed attribute SHALL be set.
The field is an Address Element to allow for support of IPv6 and port
numbers.
4.2.3 PhishNameRef Element
STRING. This value can be agreed upon by vendor collaboration to
note a common name for a given phish attack or "campaign". The
agreed upon identifier could be useful in collaboration, support,
media and public education.
4.2.4 PhishNameLocalRef Element
STRING. Many contributors will have a local reference name or
Unique-IDentifier (UID) that will be used before a commonly agreed
term is adopted in PhishNameRef. The allows a cross-reference from
the submitting organization's system to the central repository.
Cain & Jevans Expires December 24, 2005 [Page 12]
Internet-Draft IODEF Fraud Report Extensions June 2005
4.3 FraudedBrandName Element
STRING. This is the identifier of the recognized brandname or
company name used to launch the phishing activity. Some schemes,
such as those enticing mules for money laundering or related
activities, may use a lesser known or fictitious brand [e.g., xyz
semiconductor company]. Those brand identifiers should also populate
this field.
4.4 The Data Collection Site Element (DCSite)
This section identifies the type, identifier, collection location,
and other pertinent information about the credential gathering
process by the fraudster.
If the DCSite element is present, the DCSiteType element is required.
There may be multiple DCSiteData elements.
+-------------+
| DCSite |
+-------------+
| ENUM DCType |<>--(0..*)---[ DCSiteData ]
+-------------+
+------------------+
| DCSiteData |
+------------------+
| ENUM DCSiteType |<>-----------[ DCSitePointer ]
| |
+------------------+
4.4.1 DCType Parameter
ENUM. This is the method of data collection, as determined by
analyzing the victim computer, lure, or malware, and should be picked
from the following list.
1. Web. The user is redirected to a website to collects the
data.
2. Email Form. A form is embedded in the email lure.
3. Keylogger. Some form of keylogger was offered to the victim.
4. Automation. Other forms of automation such as background OLE
automation.
Cain & Jevans Expires December 24, 2005 [Page 13]
Internet-Draft IODEF Fraud Report Extensions June 2005
5. Unspecified.
4.4.2 DCSiteData Element
These elements gather the IPAddress, URL, or other identification of
the data collection site where phished data is sent. This element
includes an indication to the kind of data collector and the network
identifier and, optionally, TCP/UDP port number of the site.
4.4.2.1 DCSiteType Parameter
ENUM. This parameter specifies the address and other information in
the DataCollectionSiteData element.
1. Web, with the website URL included in DCSitePointer. Data is
collected on a website.
2. Email, with the email server DNS name in the DCSitePointer.
The victim emails credentials to the collection site.
3. IP Address, with the DCSitePointer field holding the IP
Version Protocol, IPAddress, and Port number of the collection
site. The Protocol field defaults to TCP, if absent. This
collection site uses other protocols to gather data from the
victim.
4. Unknown.
4.4.2.2 DCSitePointer Element
DCSitePointer is one of the following, depending on the DCSiteType
parameter.
URI Site URL.
STRING Email Site
SOURCE. This element contains the Protocol type, version,
IPAddress, IP Protocol, and Ports list.
4.5 OriginatingSensor Element
This section defines the identification and cognizant data of the
network element that detected this fraud activity. Note that the
network element does not have to be in the Internet itself (i.e., it
Cain & Jevans Expires December 24, 2005 [Page 14]
Internet-Draft IODEF Fraud Report Extensions June 2005
may be a local IDS system) nor is it required to be mechanical (e.g.,
humans are allowed).
Multiple Originating Sensor Elements are allowed.
+---------------------+
| OriginatingSensor |
+---------------------+
| ENUM OrigSensorType |<>------------[ DateFirstSeen ]
| |<>---(0..1)---[ Name ]
| |<>------------[ Address ]
| |<>---(0..1)---[ Location ]
+---------------------+
The OriginatingSensor requires a type value and identification of the
entity that generated this report.
4.5.1 OrigSensorType Parameter
Type parameter is an ENUM from the following:
1. Web. This is a web Server or Service.
2. WebGateway, as in a Proxy or Firewall.
3. MailGateway.
4. Browser, or browser-type element.
5. ISPsensor.
6. Human
7. Honeypot.
8. Other.
4.5.2 DateFirstSeen Element
REQUIRED. DATETIME. This is the date and time that this sensor
first saw this phishing activity.
4.5.3 Name Element
Cain & Jevans Expires December 24, 2005 [Page 15]
Internet-Draft IODEF Fraud Report Extensions June 2005
Multilingual STRING. This is the DNS name or other identifier of
the entity that generated this report.
4.5.4 Address Element
SOURCE. This is the IPVersion, IPAddress, and optionally, port
number of the entity that generated this report.
4.5.5 Location Element
STRING. This isan optional location of the sensor.
4.6 TakeDownInfo Element
This element identifies information regarding the disablement of the
phish or fraud collector site and contains information regarding the
party blocking or removing the site. A FraudReport may have multiple
TakeDownInfo elements to support activities where multiple agencies
are active. Note that the term "Agency" is used to identify any
party performing the blocking or removal -- such as ISPs or private
parties -- not just governmental entities.
+-------------------+
| TakeDownInfo |
+-------------------+
| |<>---(0..1)--[ TakeDownDate ]
| |<>---(0..1)--[ TakeDownAgency ]
| |<>---(0..1)--[ TakeDownComments ]
+-------------------+
4.6.1 TakeDownDate Element
DATETIME. This is the date and time that takedown occurred.
4.6.2 TakeDownAgency Element
STRING. This is a freeform string identifying the agency that
performed the takedown
4.6.3 TakeDownComments Element
Cain & Jevans Expires December 24, 2005 [Page 16]
Internet-Draft IODEF Fraud Report Extensions June 2005
STRING. A free form field to add any exciting details of this
takedown effort.
4.7 ArchivedData Element
+-------------------+
| ArchivedData |
+-------------------+
| ENUM Type |<>---(0..1)--[ ArchivedDataURL ]
| |<>---(0..1)--[ ArchivedDataComments ]
+-------------------+
The element is used to typecast and include a gzip archive file of a
data collection site, base camp, or other site where the phisher
developed their code. This element will be populated when, for
example, an ISP takes down a phisher's web site and has copied the
site data into an archive file. There are three types of archives
currently supported, as specified in the type filed.
4.7.1 Type Parameter
This parameter specifies the contents of the archive.
1. Data Collection Site.
2. Basecamp Site.
3. Sender Site.
4. Unspecified.
4.7.2 ArchivedDataURL Element
URL. This is the URL where the gzip archive file is located.
[As archives are quite large, a Fraud Report just points out
where the archive is, and does not include it in the report.]
4.7.3 ArchivedDataComments Element
STRING. This field is a free form area where one can comment on
the archive and/or URL, if they so please.
Cain & Jevans Expires December 24, 2005 [Page 17]
Internet-Draft IODEF Fraud Report Extensions June 2005
4.8 RelatedData Element
URL. These are non-phish web sites that are related to this incident
(e.g., victim site, etc).
4.9 CorrelationData Element
STRING. Any information that correlates this incident to other
incidents can be entered here.
4.10 PRComments Element
STRING. Comments specific to this phishing activity that does not
fit in any other field.
4.11 EmailRecord Element
Extensions are also made to the INCH IODEF Incident EventData element
to support descriptive information received in phishing lure or spam
emails. The ability to report spam is included within a PhraudReport
to support exchanging information about large-scale spam activities,
not necessarily a single spam message to a user. As such the spam
reporting mechanism was not designed to minimize overhead and
processing.
Information related to the overall fraudulent activity is contained
within the PhraudReport, while the EmailRecord element is used to
capture forensic or detailed technical information about a specific
attack. Incident Reports may have none, one, or multiple
EmailRecords as its goal is to accumulate pertinent technical data
associated with an specific attack as an investigation continues.
+--------------------+
| EmailRecord |
+--------------------+
| |<>-----------[ EmailCount ]
| |<>-----------[ EmailHeader ]
| |<>--(0..1)---[ EmailBody ]
| |<>--(0..*)---[ EmailComments ]
+--------------------+
4.11.1 EmailCount Element
NUMBER. This field indicates the number of email messages
identified in this record detected by the reporter.
Cain & Jevans Expires December 24, 2005 [Page 18]
Internet-Draft IODEF Fraud Report Extensions June 2005
4.11.2 Email Originatin IPAddress
This is the IP Version, Address, and port of the site originating
the phish or spam email and is inserted into the LureSource
element. Multiple EMailOrigIP elements are supported and encoded
as Address elements.
4.11.3 EmailHeader Element
STRING. The headers of the phish email are included in this
element as a sequence of one-lined text strings. There SHALL be
one EmailHeader element per mailRecord
4.11.4 EmailBody Element
STRING. The body of the phish email is included here. If
present, there should be at most one EmailBody element per
EmailRecord
4.11.5 EmailComments Element
STRING. Comments or relevant data not placed elsewhere about
this email may be added in this text field.
Cain & Jevans Expires December 24, 2005 [Page 19]
Internet-Draft IODEF Fraud Report Extensions June 2005
5. IODEF Required Elements
A Fraud Report requires certain identifying information, which is
contained within the standard IODEF Incident data structure. The
following table identifies attributes used in a Fraud Activity Report
and their obligation. Note that the Required column notes attributes
required by the base IODEF Incident element. Attributes identified
as required SHALL be populated in conforming phishing activity
reports.
The following table is a visual description of the required fields.
+--------------+
| Incident |
+--------------+
| ENUM Purpose |---[ IncidentID ]
| |---[ Assessment ]
| | ---> [ Confidence ]
| |---[ ReportTime ]
| |---[ Contact ]
| | ---> [ Role ]
| | ---> [ Type ]
| | ---> [ Name ]
| |---[ EventData ]
| | ---> [AdditionalData]
| | ---> [ FraudReport ]
| | ---> [ FraudType ]
| | ---> [ FraudParameter ]
| | ---> [ FraudedBrandName ]
| | ---> [ LureSource ]
| | ---> [ OriginatingSensor ]
| |
+--------------+
5.1 Fraud or Phishing Report
A compliant IODEF Fraud report is required to contain the following
fields:
Purpose
IncidentID
ReportTime
Contact -> Role
Cain & Jevans Expires December 24, 2005 [Page 20]
Internet-Draft IODEF Fraud Report Extensions June 2005
Contact -> Type
Contact -> Name
Assessment
EventData
DetectTime
AdditionalData
PhraudReport
FraudType
FraudedBrandName
LureSource
OriginatingSensor
5.2 Wide-Spread Spam Report
These following fields MUST be populated in a compliant Spam Activity
Report:
Incident Structure:
IncidentID
Purpose
ReportTime
Contact -> Role
Contact -> Type
Contact -> Name
Assessment
EventData
DetectTime
Cain & Jevans Expires December 24, 2005 [Page 21]
Internet-Draft IODEF Fraud Report Extensions June 2005
AdditionalData
PhraudReport
FraudType == spamreport
LureSource
OriginatingSensor
EmailRecord
EmailCount
EmailHeader
5.3 Guidance on Usage
It may be apparent that the mandatory attributes for a phishing
activity report make for a quite sparse report. As incident
forensics and data analysis require detailed information, the
originator of a FraudReport should include any tidbit of information
gleaned from the attack. Information that is considered more
sensitive than public can be marked to a higher sensitivity using the
restriction parameter of each data element.
Cain & Jevans Expires December 24, 2005 [Page 22]
Internet-Draft IODEF Fraud Report Extensions June 2005
6. Security Considerations
This document specifies the format of security incident data. As
such, the security of transactions containing the incident report
will vary from organization to organization. We do not want to
burden the information exchange with unnecessary encryption
requirements, as the transport service for the data exchange may
provide adequate protections, or even encryption. The use of
encryption is expected to be agreed upon on originator-recipient
agreement.
The critical security concern is that phishing activity reports may
be falsified or the report may become corrupt during transit.
Applying a digital signature on each report will counteract both of
these concerns, but again the signature may be overkill for most
activity report users. For this reason, phishing activity reports
SHOULD be digitally signed with the optional IODEF XML signature,
although we expect that each receiving entity will determine the need
for this signature independently. Generators of phishing activity
reports SHOULD digitally sign each report.
Originators of fraud activity reports SHOULD digitally sign their
report with the XML signature as described in[INCH].
Recipients of fraud reports SHALL be prepared to accept XML digitally
signed reports and SHOULD support receiving encrypted reports.
Cain & Jevans Expires December 24, 2005 [Page 23]
Internet-Draft IODEF Fraud Report Extensions June 2005
7. IANA Considerations
This document has no actions for IANA.
Cain & Jevans Expires December 24, 2005 [Page 24]
Internet-Draft IODEF Fraud Report Extensions June 2005
8. Contributors
This document has received significant assistance from two groups
addressing the phishing problem: members of the Anti-Phishing Working
Group and participants in the Financial Services Technology
Consortium's Counter-Phishing project.
9. Normative References
[IDMEF] Curry, D. and H. Debar, "The Intrusion Detection Message
Exchange Format", July 2004.
[INCH] Meijer, J., Danyliw, and Demchenko, "The Incident Object
Description Exchange Format Data Model and XML
Implementation", November 2004.
[RFC2119] Bradner, S., "Key words for use in RFCs to Indicate
Requirement Levels", BCP 14, RFC 2119, March 1997.
Authors' Addresses
Patrick Cain
The Cooper-Cain Group
P.O. Box 400992
Cambridge, MA
USA
Email: pcain@coopercain.com
David Jevans
The Anti-Phishing Working Group
38 Rice Street, Suites 2-0/2-2
Cambridge, MA, 02140
USA
Email: dave.jevans@antiphishing.org
Cain & Jevans Expires December 24, 2005 [Page 25]
Internet-Draft IODEF Fraud Report Extensions June 2005
Appendix A. Phishing Extensions XML Schema
A digital copy of this file is available to prevent errors when re-
entering text. See www.coopercain.com/incidents .
This is an EventData.AdditionalData
structure for an IODEF Incident class.
Cain & Jevans Expires December 24, 2005 [Page 26]
Internet-Draft IODEF Fraud Report Extensions June 2005
Cain & Jevans Expires December 24, 2005 [Page 27]
Internet-Draft IODEF Fraud Report Extensions June 2005
Cain & Jevans Expires December 24, 2005 [Page 28]
Internet-Draft IODEF Fraud Report Extensions June 2005
Cain & Jevans Expires December 24, 2005 [Page 29]
Internet-Draft IODEF Fraud Report Extensions June 2005
Cain & Jevans Expires December 24, 2005 [Page 31]
Internet-Draft IODEF Fraud Report Extensions June 2005
Cain & Jevans Expires December 24, 2005 [Page 32]
Internet-Draft IODEF Fraud Report Extensions June 2005
Appendix B. Phishing Extensions XML DTD
This will be supplied rather soonish.
Cain & Jevans Expires December 24, 2005 [Page 33]
Internet-Draft IODEF Fraud Report Extensions June 2005
Appendix C. Examples of Complete Fraud Activity Reports
C.1 Sample Phish/Malware Email Report
C.2 Received Email
From: support@coopercain.com
Sent: Friday, June 10, 2005 3:52 PM
To: pcain@coopercain.com
Subject: You have successfully updated your password
Attachments: updated-password.zip
Dear user pcain,
You have successfully updated the password of your
Coopercain account.
If you did not authorize this change or if you need
assistance with your account, please contact Coopercain
customer service at: support@coopercain.com
Thank you for using Coopercain!
The Coopercain Support Team
+++ Attachment: No Virus (Clean)
+++ Coopercain Antivirus - www.coopercain.com
C.3 Generated Report
NOTE: Some wrapping and folding liberites have been applied to fit it
into the margins.
Cain & Jevans Expires December 24, 2005 [Page 34]
Internet-Draft IODEF Fraud Report Extensions June 2005
PAT2005-06
This is a test report from actual data.
pcain@coopercain.com
2005-06-22T08:30:00-05:00
2005-06-21T18:22:02-05:00
Subject: You have successfully updated
your password
Cooper-Cain
216.231.63.162
10.0.0.4
1
Envelope-to: pcain@coopercain.com
Delivery-date: Fri, 10 Jun 2005 15:52:11 -0400
Received: from dsl231-063-162.sea1.dsl.speakeasy.net
([216.231.63.162] helo=coopercain.com)
by mail06.coopercain.com with esmtp (Exim)
for pcain@coopercain.com;
Fri, 10 Jun 2005 15:52:10 -0400
From: support@coopercain.com
Subject: You have successfully updated
Cain & Jevans Expires December 24, 2005 [Page 35]
Internet-Draft IODEF Fraud Report Extensions June 2005
your password
Date: Fri, 10 Jun 2005 12:52:00 -0700
Content-Type: multipart/mixed;
boundary="----=_NextPart_000_0008_0911068B.E7EB6D2A"
X-MSMail-Priority: Normal
X-EN-OrigIP: 216.231.63.162
X-EN-OrigHost: dsl231-063-162.sea1.dsl.speakeasy.net
X-Spam-Checker-Version: SpamAssassin 3.0.2
(2004-11-16) on
X-Spam-Status: No, score=5.6 required=6.0
tests=BAYES_95,CABLEDSL,HTML_20_30,
HTML_MESSAGE,MIME_HTML_ONLY,MISSING_MIMEOLE,
NO_REAL_NAME,
PRIORITY_NO_NAME autolearn=disabled
version=3.0.2
Cain & Jevans Expires December 24, 2005 [Page 36]
Internet-Draft IODEF Fraud Report Extensions June 2005
Appendix D. Sample Spam Report
[ ed. To be supplied, but it looks a lot like the fraud report]
Cain & Jevans Expires December 24, 2005 [Page 37]
Internet-Draft IODEF Fraud Report Extensions June 2005
Intellectual Property Statement
The IETF takes no position regarding the validity or scope of any
Intellectual Property Rights or other rights that might be claimed to
pertain to the implementation or use of the technology described in
this document or the extent to which any license under such rights
might or might not be available; nor does it represent that it has
made any independent effort to identify any such rights. Information
on the procedures with respect to rights in RFC documents can be
found in BCP 78 and BCP 79.
Copies of IPR disclosures made to the IETF Secretariat and any
assurances of licenses to be made available, or the result of an
attempt made to obtain a general license or permission for the use of
such proprietary rights by implementers or users of this
specification can be obtained from the IETF on-line IPR repository at
http://www.ietf.org/ipr.
The IETF invites any interested party to bring to its attention any
copyrights, patents or patent applications, or other proprietary
rights that may cover technology that may be required to implement
this standard. Please address the information to the IETF at
ietf-ipr@ietf.org.
Disclaimer of Validity
This document and the information contained herein are provided on an
"AS IS" basis and THE CONTRIBUTOR, THE ORGANIZATION HE/SHE REPRESENTS
OR IS SPONSORED BY (IF ANY), THE INTERNET SOCIETY AND THE INTERNET
ENGINEERING TASK FORCE DISCLAIM ALL WARRANTIES, EXPRESS OR IMPLIED,
INCLUDING BUT NOT LIMITED TO ANY WARRANTY THAT THE USE OF THE
INFORMATION HEREIN WILL NOT INFRINGE ANY RIGHTS OR ANY IMPLIED
WARRANTIES OF MERCHANTABILITY OR FITNESS FOR A PARTICULAR PURPOSE.
Copyright Statement
Copyright (C) The Internet Society (2005). This document is subject
to the rights, licenses and restrictions contained in BCP 78, and
except as set forth therein, the authors retain all their rights.
Acknowledgment
Funding for the RFC Editor function is currently provided by the
Internet Society.
Cain & Jevans Expires December 24, 2005 [Page 38]