-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Filebeat] Threat Intel Module - Adjust Anomali Fields #24746
Labels
Comments
botelastic
bot
added
the
needs_team
Indicates that the issue/PR needs a Team:* label
label
Mar 24, 2021
peasead
added
Team:Security-External Integrations
and removed
needs_team
Indicates that the issue/PR needs a Team:* label
labels
Mar 24, 2021
Pinging @elastic/security-external-integrations (Team:Security-External Integrations) |
I can implement this if it's wanted. |
Yeah, I think any help would be appreciated. @P1llus may have some unchecked-in code though, so I'll let him make the call. |
Feel free @legoguy1000 :) |
6 tasks
PR Ready |
legoguy1000
added a commit
to legoguy1000/beats
that referenced
this issue
Aug 6, 2021
P1llus
pushed a commit
that referenced
this issue
Aug 10, 2021
P1llus
added a commit
that referenced
this issue
Aug 21, 2021
(cherry picked from commit 7fa146c) Co-authored-by: Alex Resnick <[email protected]> Co-authored-by: Marius Iversen <[email protected]>
P1llus
pushed a commit
that referenced
this issue
Aug 21, 2021
(cherry picked from commit 7fa146c) Co-authored-by: Alex Resnick <[email protected]>
Sign up for free
to join this conversation on GitHub.
Already have an account?
Sign in to comment
Describe the enhancement:
The Anomali dataset has fields that I think should be adjusted.
threatintel.anomali.labels
totags
Possibly add in
x-pack/filebeat/module/threatintel/anomali/ingest/pipeline.yml
?threatintel.anomali.description.source
tothreatintel.indicator.provider
So
threatintel.indicator.provider:Emerging Threats - Compromised
Describe a specific use case for the enhancement or feature:
This would populate the
tags
field from this dataset the same way the MISP dataset is populated and also to populate thethreatintel.indicator.provider
field like the Abuse URL data is.The text was updated successfully, but these errors were encountered: