-
Notifications
You must be signed in to change notification settings - Fork 419
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
New event categorization values to support threat intel use cases #1510
New event categorization values to support threat intel use cases #1510
Conversation
@@ -2407,6 +2407,11 @@ event.category: | |||
- end | |||
- info | |||
name: session | |||
- description: Relating to cybersecurity threats. Use this category to visualize |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- description: Relating to cybersecurity threats. Use this category to visualize | |
- description: Use this category to visualize |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
generated/ecs/ecs_flat.yml
Outdated
@@ -2057,6 +2057,11 @@ event.category: | |||
- end | |||
- info | |||
name: session | |||
- description: Relating to cybersecurity threats. Use this category to visualize |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- description: Relating to cybersecurity threats. Use this category to visualize | |
- description: Use this category to visualize |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
generated/ecs/ecs_nested.yml
Outdated
@@ -2835,6 +2835,11 @@ event: | |||
- end | |||
- info | |||
name: session | |||
- description: Relating to cybersecurity threats. Use this category to visualize |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- description: Relating to cybersecurity threats. Use this category to visualize | |
- description: Use this category to visualize |
schemas/event.yml
Outdated
@@ -296,6 +305,12 @@ | |||
- start | |||
- end | |||
- info | |||
- name: threat | |||
description: > | |||
Relating to cybersecurity threats. Use this category to visualize and analyze events |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Relating to cybersecurity threats. Use this category to visualize and analyze events | |
Use this category to visualize and analyze events |
@@ -3185,6 +3185,11 @@ event: | |||
- end | |||
- info | |||
name: session | |||
- description: Relating to cybersecurity threats. Use this category to visualize |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
- description: Relating to cybersecurity threats. Use this category to visualize | |
- description: Use this category to visualize |
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
I had a similar thought to @peasead about generalizing the definition of threat
, so I'm glad that's covered here 👍 .
The only other note I had here, broadly, was about the use of event.kind: enrichment
. Coupled with the other sub-categories introduced here, it seems potentially redundant to define a new top-level event.kind
solely for an intended use case.
I think the argument could be made that the data generated by filebeat's threatintel modules is more general than enrichment: it's intelligence; something (potentially) noteworthy that was observed and recorded. That might be a broad enough definition to simply reuse event
, or maybe we generalize to intelligence
or even observable
, but IMO enrichment
describes a use case as opposed to a category of data.
As an example, the dashboards that ship with filebeat threatintel modules describe the population of ingested data, and do not touch on enrichment at all, because that's a downstream process (brief aside: I could_ see event.kind: enrichment
being used to capture an actual enrichment event, e.g. "event A was enriched with indicator B")
To be honest, I never quite understood the I assumed it was for some schema requirement I had missed. I continually forgot to ask about it in the right audience. I think that You mentioned it's not in the dashboards, so that would be a pretty simple and non-impactful change (enrichments -> event), right? |
Co-authored-by: Andrew Pease <[email protected]>
8ae273c
to
a6ca2e4
Compare
@rylnd @peasead No objections from my end if we pause on introducing However, the Ideally, those modules will use valid ECS categorization values. If there's a change in direction, the Beats modules will also need to reflect that change, I believe. |
Yep, that's a big consideration that I should have mentioned. If we need some new value for |
I think At the same time, there's plenty of use cases that it could open up: named geopoints/shapes, organizational department data for a given username or IP, CVE info (!)... I think once these mechanics are worked out, there's so much value that could be added. I also agree with @peasead that observable and intelligence doesn't make sense. |
Hi @rylnd Thanks for moving this PR forward, and for sanity-checking with all of us on the I am +1 for moving forward with the proposed
We do. As @dcode mentions above, none of the existing allowed values is appropriate for additional knowledge we can combine with something that happened (e.g., events, metrics) to provide beneficial information and context to the analyst.
I don't think it's inconsistent, as it seems to "fit" quite well in this example, threat intel, and some other envisioned for the future, such as, again suggested by @dcode, named geopoints/shapes, organizational department data for a given username or IP, CVE info. Brainstorming hypothetical future categorization triples to demonstrate consistent usage:
|
Great feedback. TL;DR we're good with I always understood indicators would be combined with other events to make enrichments and intelligence, I just wasn't aware "evil.com" would be considered an This is why I didn't bring it up before as I assumed it was a schema implementation I wasn't thinking about properly. I assumed That's why I held my nose and suggested |
Thanks, all, for the discussion. Looks like we have a consensus to move forward with these additions. I also propose these changes are backported to the
Not expecting objections, but I did want to raise and open the opportunity for any feedback on including these changes for |
I'd appreciate a final 👀 and ✅ if there's no additional feedback. |
…astic#1510) * introduce event.kind:enrichment, event.category:threat, and event.type:indicator * update docs and artifacts * Drop mention of "cybersecurity threats" Co-authored-by: Andrew Pease <[email protected]> * artifacts * alphabetize Co-authored-by: Andrew Pease <[email protected]>
…astic#1510) * introduce event.kind:enrichment, event.category:threat, and event.type:indicator * update docs and artifacts * Drop mention of "cybersecurity threats" Co-authored-by: Andrew Pease <[email protected]> * artifacts * alphabetize Co-authored-by: Andrew Pease <[email protected]>
) (#1553) * introduce event.kind:enrichment, event.category:threat, and event.type:indicator * update docs and artifacts * Drop mention of "cybersecurity threats" Co-authored-by: Andrew Pease <[email protected]> * artifacts * alphabetize Co-authored-by: Andrew Pease <[email protected]> Co-authored-by: Andrew Pease <[email protected]>
) (#1554) * introduce event.kind:enrichment, event.category:threat, and event.type:indicator * update docs and artifacts * Drop mention of "cybersecurity threats" Co-authored-by: Andrew Pease <[email protected]> * artifacts * alphabetize Co-authored-by: Andrew Pease <[email protected]> Co-authored-by: Andrew Pease <[email protected]>
Summary
This PR introduces three categorization field allowed values.
These fields were initially proposed in RFC 008 - threat intelligence fields and will be added as
beta
values to align with RFC 0008 currently being at stage 2.event.kind: enrichment
Introduced here to support threat enrichment, but it will not be limited to that use case. Available for any ECS event that will be used to enrich others.
event.category: threat
Categorize events that contain details about threat actors' tactics, techniques, and procedures.
event.type: indicator
Sub-bucket threat enrichment indicators of compromise.
Questions for reviewers
event.catgory:threat
, I limited the scope tocybersecurity threats
in the description. Is this too narrow?threat
category include additional expected event types beyondindicator
?NOTE: Opening PR as draft until the functionality is added into the ECS tooling to include theAdded in #1511beta
tooltip for event categorization values