Skip to content

Commit c87f63a

Browse files
committed
Stage 2 changes for RFC 0008 - threat indicator fields (elastic#1471)
* remove experimental threat definitions * add threat intel RFC beta fields * add artifacts * s/expected/recommended * add changelog * spaces anomaly * artifacts # Conflicts: # experimental/generated/csv/fields.csv # generated/csv/fields.csv
1 parent abb5d5b commit c87f63a

File tree

18 files changed

+1149
-490
lines changed

18 files changed

+1149
-490
lines changed

CHANGELOG.next.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -22,6 +22,7 @@ Thanks, you're awesome :-) -->
2222
* Added `event.agent_id_status` field. #1454
2323
* `threat.enrichments` added to the experimental schema. #1457
2424
* `process.target` and `process.target.parent` added to experimental schema. #1467
25+
* Threat indicator fields progress to beta stage. #1471
2526

2627
#### Improvements
2728

code/go/ecs/threat.go

Lines changed: 77 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

docs/field-details.asciidoc

Lines changed: 274 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7735,6 +7735,280 @@ example: `https://attack.mitre.org/groups/G0037/`
77357735

77367736
// ===============================================================
77377737

7738+
|
7739+
[[field-threat-indicator-confidence]]
7740+
<<field-threat-indicator-confidence, threat.indicator.confidence>>
7741+
7742+
| beta:[ This field is beta and subject to change. ]
7743+
7744+
Identifies the confidence rating assigned by the provider using STIX confidence scales.
7745+
7746+
Recommended values:
7747+
7748+
* Not Specified, None, Low, Medium, High
7749+
7750+
* 0-10
7751+
7752+
* Admirality Scale (1-6)
7753+
7754+
* DNI Scale (5-95)
7755+
7756+
* WEP Scale (Impossible - Certain)
7757+
7758+
type: keyword
7759+
7760+
7761+
7762+
example: `High`
7763+
7764+
| extended
7765+
7766+
// ===============================================================
7767+
7768+
|
7769+
[[field-threat-indicator-description]]
7770+
<<field-threat-indicator-description, threat.indicator.description>>
7771+
7772+
| beta:[ This field is beta and subject to change. ]
7773+
7774+
Describes the type of action conducted by the threat.
7775+
7776+
type: keyword
7777+
7778+
7779+
7780+
example: `IP x.x.x.x was observed delivering the Angler EK.`
7781+
7782+
| extended
7783+
7784+
// ===============================================================
7785+
7786+
|
7787+
[[field-threat-indicator-email-address]]
7788+
<<field-threat-indicator-email-address, threat.indicator.email.address>>
7789+
7790+
| beta:[ This field is beta and subject to change. ]
7791+
7792+
Identifies a threat indicator as an email address (irrespective of direction).
7793+
7794+
type: keyword
7795+
7796+
7797+
7798+
example: `phish@example.com`
7799+
7800+
| extended
7801+
7802+
// ===============================================================
7803+
7804+
|
7805+
[[field-threat-indicator-first-seen]]
7806+
<<field-threat-indicator-first-seen, threat.indicator.first_seen>>
7807+
7808+
| beta:[ This field is beta and subject to change. ]
7809+
7810+
The date and time when intelligence source first reported sighting this indicator.
7811+
7812+
type: date
7813+
7814+
7815+
7816+
example: `2020-11-05T17:25:47.000Z`
7817+
7818+
| extended
7819+
7820+
// ===============================================================
7821+
7822+
|
7823+
[[field-threat-indicator-ip]]
7824+
<<field-threat-indicator-ip, threat.indicator.ip>>
7825+
7826+
| beta:[ This field is beta and subject to change. ]
7827+
7828+
Identifies a threat indicator as an IP address (irrespective of direction).
7829+
7830+
type: ip
7831+
7832+
7833+
7834+
example: `1.2.3.4`
7835+
7836+
| extended
7837+
7838+
// ===============================================================
7839+
7840+
|
7841+
[[field-threat-indicator-last-seen]]
7842+
<<field-threat-indicator-last-seen, threat.indicator.last_seen>>
7843+
7844+
| beta:[ This field is beta and subject to change. ]
7845+
7846+
The date and time when intelligence source last reported sighting this indicator.
7847+
7848+
type: date
7849+
7850+
7851+
7852+
example: `2020-11-05T17:25:47.000Z`
7853+
7854+
| extended
7855+
7856+
// ===============================================================
7857+
7858+
|
7859+
[[field-threat-indicator-marking-tlp]]
7860+
<<field-threat-indicator-marking-tlp, threat.indicator.marking.tlp>>
7861+
7862+
| beta:[ This field is beta and subject to change. ]
7863+
7864+
Traffic Light Protocol sharing markings.
7865+
7866+
Recommended values are:
7867+
7868+
* WHITE
7869+
7870+
* GREEN
7871+
7872+
* AMBER
7873+
7874+
* RED
7875+
7876+
type: keyword
7877+
7878+
7879+
7880+
example: `WHITE`
7881+
7882+
| extended
7883+
7884+
// ===============================================================
7885+
7886+
|
7887+
[[field-threat-indicator-modified-at]]
7888+
<<field-threat-indicator-modified-at, threat.indicator.modified_at>>
7889+
7890+
| beta:[ This field is beta and subject to change. ]
7891+
7892+
The date and time when intelligence source last modified information for this indicator.
7893+
7894+
type: date
7895+
7896+
7897+
7898+
example: `2020-11-05T17:25:47.000Z`
7899+
7900+
| extended
7901+
7902+
// ===============================================================
7903+
7904+
|
7905+
[[field-threat-indicator-port]]
7906+
<<field-threat-indicator-port, threat.indicator.port>>
7907+
7908+
| beta:[ This field is beta and subject to change. ]
7909+
7910+
Identifies a threat indicator as a port number (irrespective of direction).
7911+
7912+
type: long
7913+
7914+
7915+
7916+
example: `443`
7917+
7918+
| extended
7919+
7920+
// ===============================================================
7921+
7922+
|
7923+
[[field-threat-indicator-scanner-stats]]
7924+
<<field-threat-indicator-scanner-stats, threat.indicator.scanner_stats>>
7925+
7926+
| beta:[ This field is beta and subject to change. ]
7927+
7928+
Count of AV/EDR vendors that successfully detected malicious file or URL.
7929+
7930+
type: long
7931+
7932+
7933+
7934+
example: `4`
7935+
7936+
| extended
7937+
7938+
// ===============================================================
7939+
7940+
|
7941+
[[field-threat-indicator-sightings]]
7942+
<<field-threat-indicator-sightings, threat.indicator.sightings>>
7943+
7944+
| beta:[ This field is beta and subject to change. ]
7945+
7946+
Number of times this indicator was observed conducting threat activity.
7947+
7948+
type: long
7949+
7950+
7951+
7952+
example: `20`
7953+
7954+
| extended
7955+
7956+
// ===============================================================
7957+
7958+
|
7959+
[[field-threat-indicator-type]]
7960+
<<field-threat-indicator-type, threat.indicator.type>>
7961+
7962+
| beta:[ This field is beta and subject to change. ]
7963+
7964+
Type of indicator as represented by Cyber Observable in STIX 2.0.
7965+
7966+
Recommended values:
7967+
7968+
* autonomous-system
7969+
7970+
* artifact
7971+
7972+
* directory
7973+
7974+
* domain-name
7975+
7976+
* email-addr
7977+
7978+
* file
7979+
7980+
* ipv4-addr
7981+
7982+
* ipv6-addr
7983+
7984+
* mac-addr
7985+
7986+
* mutex
7987+
7988+
* port
7989+
7990+
* process
7991+
7992+
* software
7993+
7994+
* url
7995+
7996+
* user-account
7997+
7998+
* windows-registry-key
7999+
8000+
* x509-certificate
8001+
8002+
type: keyword
8003+
8004+
8005+
8006+
example: `ipv4-addr`
8007+
8008+
| extended
8009+
8010+
// ===============================================================
8011+
77388012
|
77398013
[[field-threat-software-id]]
77408014
<<field-threat-software-id, threat.software.id>>

0 commit comments

Comments
 (0)