Files App / iCloud Drive File Provider Metadata

iOSFilesystem & TimelineDevice ExtractionCloud Control Plane

Location

File Provider and Files app domains, including AppDomainGroup-group.com.apple.FileProvider.LocalStorage/ and iCloud Drive metadata caches

Common Names

File Provider StorageiCloud DriveFiles app

Description

Metadata created by the Files app and Apple File Provider framework for iCloud Drive and supported third-party storage providers. These stores track visible files, document providers, downloads, placeholders, and synchronization state across Files locations.

Forensic Value

File Provider metadata can prove that a user browsed, staged, or downloaded cloud-backed content even when the full file was not resident on the device at collection time. This is particularly important in exfiltration and insider-threat investigations where investigators need to determine whether a sensitive file was merely visible, opened, pinned locally, or exported from iCloud Drive or another provider presented through Files. Provider identifiers also help scope which cloud services were active on the device.

Tools Required

Cellebrite UFEDiLEAPPMagnet AXIOMBelkasoftplist Editor

Collection Commands

Cellebrite UFED

Perform a full filesystem extraction and review File Provider / Files app domains.

iLEAPP

python3 ileapp.py -t tar -i /path/to/ios_extraction -o /forensics/output/

Elcomsoft EIFT

Collect iCloud Drive metadata alongside local device extraction when cloud access is legally authorized.

Collection Constraints

  • Availability depends on iOS version, device lock state, backup class, and extraction method. Many protected domains require a full filesystem extraction or sysdiagnose rather than a standard backup.
  • Mobile application data may be partially cached, excluded from backup, or pruned by the OS. Validate against the extraction type before treating gaps as meaningful.
  • Hydrated file content, provider coverage, and path layout vary by provider and iOS release. Some provider metadata may appear only in full filesystem extractions or iCloud-side collections.

MITRE ATT&CK Techniques

T1567.002T1005T1083