Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

[RFC] Create Threat Fieldset - Stage 2 Proposal #1293

Merged
merged 38 commits into from
Jun 23, 2021
Merged
Show file tree
Hide file tree
Changes from 29 commits
Commits
Show all changes
38 commits
Select commit Hold shift + click to select a range
a6a93f1
initial stage 2 commit
peasead Mar 8, 2021
a5f7a67
added stage 2 PR number
peasead Mar 8, 2021
49c2748
Update rfcs/text/0008-threat-intel.md
peasead Mar 15, 2021
6edd79f
changed indicator.description to keyword
peasead Mar 15, 2021
5117b8e
typo for t.i.dataset
peasead Mar 15, 2021
1f4c9dc
updated tlp examples to match
peasead Mar 15, 2021
c43f9e0
updated people
peasead Mar 15, 2021
540e64e
changed .type to have 1 example
peasead Mar 15, 2021
bac7ff9
Merge branch 'create-threat-stage-2' of github.com:elastic/ecs into c…
peasead Mar 15, 2021
b48f6e3
Update rfcs/text/0008/threat.yml
peasead Mar 25, 2021
fb057b0
Add event fieldset under threat.indicator fieldset
rylnd Apr 12, 2021
33bf83d
Merge branch 'master' into create-threat-stage-2
rylnd Apr 23, 2021
a9d5471
Remove threat enrichment proposal/documentation
rylnd Apr 23, 2021
553c624
Merge branch 'master' into create-threat-stage-2
rylnd Apr 23, 2021
1bcedad
Merge branch 'master' into create-threat-stage-2
peasead May 5, 2021
c6adb7e
removed matched in prep for future RFC
peasead May 6, 2021
4d76893
removed fieldsets that are not to be nested under threat.indicator.*
peasead May 17, 2021
b098985
removed as.yml
peasead May 17, 2021
8270121
removed threat.indicator from reused fields from readme
peasead May 17, 2021
9034b85
Merge branch 'master' into create-threat-stage-2
peasead May 18, 2021
6c5c117
Merge branch 'master' into create-threat-stage-2
rylnd May 18, 2021
2e47ab0
Update rfcs/text/0008-threat-intel.md
peasead May 24, 2021
8a161f4
Update rfcs/text/0008-threat-intel.md
peasead May 24, 2021
5c826ac
Update rfcs/text/0008-threat-intel.md
peasead May 24, 2021
b24d6d1
updated example documents
peasead May 28, 2021
526219b
fix example formatting
ebeahan May 28, 2021
314a427
another formatting fix
ebeahan May 28, 2021
41a8486
moved proposed fields to existing event and url fieldsets
peasead Jun 3, 2021
e007771
Update threat.yml
peasead Jun 8, 2021
f8ed4c2
added modified_at field
peasead Jun 15, 2021
d8d3f5b
Merge branch 'create-threat-stage-2' of https://github.com/elastic/ec…
peasead Jun 15, 2021
f7dbf75
typo
peasead Jun 15, 2021
b442fdc
Merge branch 'master' into create-threat-stage-2
djptek Jun 16, 2021
9f56f32
Merge branch 'master' into create-threat-stage-2
peasead Jun 22, 2021
31616fa
Correct expected indicator.type value for X509 Certificates
adriansr Jun 23, 2021
c94e5f1
missing colon
ebeahan Jun 23, 2021
aa27247
set advance date
ebeahan Jun 23, 2021
ee0192e
Merge branch 'master' into create-threat-stage-2
ebeahan Jun 23, 2021
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
393 changes: 150 additions & 243 deletions rfcs/text/0008-threat-intel.md

Large diffs are not rendered by default.

5 changes: 0 additions & 5 deletions rfcs/text/0008/as.yml

This file was deleted.

5 changes: 0 additions & 5 deletions rfcs/text/0008/file.yml

This file was deleted.

5 changes: 0 additions & 5 deletions rfcs/text/0008/geo.yml

This file was deleted.

5 changes: 0 additions & 5 deletions rfcs/text/0008/hash.yml

This file was deleted.

5 changes: 0 additions & 5 deletions rfcs/text/0008/pe.yml

This file was deleted.

5 changes: 0 additions & 5 deletions rfcs/text/0008/registry.yml

This file was deleted.

77 changes: 8 additions & 69 deletions rfcs/text/0008/threat.yml
Original file line number Diff line number Diff line change
Expand Up @@ -37,7 +37,7 @@
description: >
Type of indicator as represented by Cyber Observable in STIX 2.0.

Expected values
Recommended values
* autonomous-system
* artifact
* directory
Expand All @@ -48,6 +48,7 @@
* ipv6-addr
* mac-addr
* mutex
* port
* process
* software
* url
Expand All @@ -59,7 +60,7 @@

- name: indicator.description
level: extended
type: wildcard
type: keyword
short: Indicator description
description: >
Describes the type of action conducted by the threat.
Expand All @@ -75,14 +76,6 @@

example: 4

- name: indicator.provider
level: extended
type: keyword
description: >
Identifies the name of the intelligence provider.

example: VirusTotal

- name: indicator.confidence
level: extended
type: keyword
Expand All @@ -99,24 +92,6 @@

example: High

- name: indicator.module
level: extended
type: keyword
short: Indicator module
description: >
Identifies the name of specific module this data is coming from.

example: threatintel

- name: indicator.dataset
level: extended
type: keyword
short: Indicator dataset
description: >
Identifies the name of specific dataset from the intelligence source.

example: threatintel.abusemalware

- name: indicator.ip
level: extended
type: ip
Expand All @@ -126,15 +101,6 @@

example: 1.2.3.4

- name: indicator.domain
level: extended
type: keyword
short: Indicator domain name
description: >
Identifies a threat indicator as a domain (irrespective of direction).

example: example.com

- name: indicator.port
level: extended
type: long
Expand All @@ -160,37 +126,10 @@
description: >
Traffic Light Protocol sharing markings.

Expected values are:
* White
* Green
* Amber
* Red
Recommended values are:
* WHITE
* GREEN
* AMBER
* RED

example: White

- name: indicator.matched.atomic
level: extended
type: keyword
short: Indicator atomic match
description: >
Identifies the atomic indicator that matched a local environment endpoint or network event.

example: example.com

- name: indicator.matched.field
level: extended
type: keyword
short: Indicator field match
description: >
Identifies the field of the atomic indicator that matched a local environment endpoint or network event.

example: file.hash.sha256

- name: indicator.matched.type
level: extended
type: keyword
short: Indicator type match
description: >
Identifies the type of the atomic indicator that matched a local environment endpoint or network event.

example: domain-name
5 changes: 0 additions & 5 deletions rfcs/text/0008/url.yml

This file was deleted.

5 changes: 0 additions & 5 deletions rfcs/text/0008/x509.yml

This file was deleted.