Skip to content

Commit 742b8f3

Browse files
authored
Stage 2 changes for RFC 0008 - threat indicator fields (#1471)
* remove experimental threat definitions * add threat intel RFC beta fields * add artifacts * s/expected/recommended * add changelog * spaces anomaly * artifacts
1 parent 11aab1d commit 742b8f3

File tree

18 files changed

+1149
-490
lines changed

18 files changed

+1149
-490
lines changed

CHANGELOG.next.md

Lines changed: 1 addition & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -27,6 +27,7 @@ Thanks, you're awesome :-) -->
2727
* Added `event.agent_id_status` field. #1454
2828
* `threat.enrichments` added to the experimental schema. #1457
2929
* `process.target` and `process.target.parent` added to experimental schema. #1467
30+
* Threat indicator fields progress to beta stage. #1471
3031

3132
#### Improvements
3233

code/go/ecs/threat.go

Lines changed: 77 additions & 0 deletions
Some generated files are not rendered by default. Learn more about customizing how changed files appear on GitHub.

docs/field-details.asciidoc

Lines changed: 274 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -7726,6 +7726,280 @@ example: `https://attack.mitre.org/groups/G0037/`
77267726

77277727
// ===============================================================
77287728

7729+
|
7730+
[[field-threat-indicator-confidence]]
7731+
<<field-threat-indicator-confidence, threat.indicator.confidence>>
7732+
7733+
| beta:[ This field is beta and subject to change. ]
7734+
7735+
Identifies the confidence rating assigned by the provider using STIX confidence scales.
7736+
7737+
Recommended values:
7738+
7739+
* Not Specified, None, Low, Medium, High
7740+
7741+
* 0-10
7742+
7743+
* Admirality Scale (1-6)
7744+
7745+
* DNI Scale (5-95)
7746+
7747+
* WEP Scale (Impossible - Certain)
7748+
7749+
type: keyword
7750+
7751+
7752+
7753+
example: `High`
7754+
7755+
| extended
7756+
7757+
// ===============================================================
7758+
7759+
|
7760+
[[field-threat-indicator-description]]
7761+
<<field-threat-indicator-description, threat.indicator.description>>
7762+
7763+
| beta:[ This field is beta and subject to change. ]
7764+
7765+
Describes the type of action conducted by the threat.
7766+
7767+
type: keyword
7768+
7769+
7770+
7771+
example: `IP x.x.x.x was observed delivering the Angler EK.`
7772+
7773+
| extended
7774+
7775+
// ===============================================================
7776+
7777+
|
7778+
[[field-threat-indicator-email-address]]
7779+
<<field-threat-indicator-email-address, threat.indicator.email.address>>
7780+
7781+
| beta:[ This field is beta and subject to change. ]
7782+
7783+
Identifies a threat indicator as an email address (irrespective of direction).
7784+
7785+
type: keyword
7786+
7787+
7788+
7789+
example: `phish@example.com`
7790+
7791+
| extended
7792+
7793+
// ===============================================================
7794+
7795+
|
7796+
[[field-threat-indicator-first-seen]]
7797+
<<field-threat-indicator-first-seen, threat.indicator.first_seen>>
7798+
7799+
| beta:[ This field is beta and subject to change. ]
7800+
7801+
The date and time when intelligence source first reported sighting this indicator.
7802+
7803+
type: date
7804+
7805+
7806+
7807+
example: `2020-11-05T17:25:47.000Z`
7808+
7809+
| extended
7810+
7811+
// ===============================================================
7812+
7813+
|
7814+
[[field-threat-indicator-ip]]
7815+
<<field-threat-indicator-ip, threat.indicator.ip>>
7816+
7817+
| beta:[ This field is beta and subject to change. ]
7818+
7819+
Identifies a threat indicator as an IP address (irrespective of direction).
7820+
7821+
type: ip
7822+
7823+
7824+
7825+
example: `1.2.3.4`
7826+
7827+
| extended
7828+
7829+
// ===============================================================
7830+
7831+
|
7832+
[[field-threat-indicator-last-seen]]
7833+
<<field-threat-indicator-last-seen, threat.indicator.last_seen>>
7834+
7835+
| beta:[ This field is beta and subject to change. ]
7836+
7837+
The date and time when intelligence source last reported sighting this indicator.
7838+
7839+
type: date
7840+
7841+
7842+
7843+
example: `2020-11-05T17:25:47.000Z`
7844+
7845+
| extended
7846+
7847+
// ===============================================================
7848+
7849+
|
7850+
[[field-threat-indicator-marking-tlp]]
7851+
<<field-threat-indicator-marking-tlp, threat.indicator.marking.tlp>>
7852+
7853+
| beta:[ This field is beta and subject to change. ]
7854+
7855+
Traffic Light Protocol sharing markings.
7856+
7857+
Recommended values are:
7858+
7859+
* WHITE
7860+
7861+
* GREEN
7862+
7863+
* AMBER
7864+
7865+
* RED
7866+
7867+
type: keyword
7868+
7869+
7870+
7871+
example: `WHITE`
7872+
7873+
| extended
7874+
7875+
// ===============================================================
7876+
7877+
|
7878+
[[field-threat-indicator-modified-at]]
7879+
<<field-threat-indicator-modified-at, threat.indicator.modified_at>>
7880+
7881+
| beta:[ This field is beta and subject to change. ]
7882+
7883+
The date and time when intelligence source last modified information for this indicator.
7884+
7885+
type: date
7886+
7887+
7888+
7889+
example: `2020-11-05T17:25:47.000Z`
7890+
7891+
| extended
7892+
7893+
// ===============================================================
7894+
7895+
|
7896+
[[field-threat-indicator-port]]
7897+
<<field-threat-indicator-port, threat.indicator.port>>
7898+
7899+
| beta:[ This field is beta and subject to change. ]
7900+
7901+
Identifies a threat indicator as a port number (irrespective of direction).
7902+
7903+
type: long
7904+
7905+
7906+
7907+
example: `443`
7908+
7909+
| extended
7910+
7911+
// ===============================================================
7912+
7913+
|
7914+
[[field-threat-indicator-scanner-stats]]
7915+
<<field-threat-indicator-scanner-stats, threat.indicator.scanner_stats>>
7916+
7917+
| beta:[ This field is beta and subject to change. ]
7918+
7919+
Count of AV/EDR vendors that successfully detected malicious file or URL.
7920+
7921+
type: long
7922+
7923+
7924+
7925+
example: `4`
7926+
7927+
| extended
7928+
7929+
// ===============================================================
7930+
7931+
|
7932+
[[field-threat-indicator-sightings]]
7933+
<<field-threat-indicator-sightings, threat.indicator.sightings>>
7934+
7935+
| beta:[ This field is beta and subject to change. ]
7936+
7937+
Number of times this indicator was observed conducting threat activity.
7938+
7939+
type: long
7940+
7941+
7942+
7943+
example: `20`
7944+
7945+
| extended
7946+
7947+
// ===============================================================
7948+
7949+
|
7950+
[[field-threat-indicator-type]]
7951+
<<field-threat-indicator-type, threat.indicator.type>>
7952+
7953+
| beta:[ This field is beta and subject to change. ]
7954+
7955+
Type of indicator as represented by Cyber Observable in STIX 2.0.
7956+
7957+
Recommended values:
7958+
7959+
* autonomous-system
7960+
7961+
* artifact
7962+
7963+
* directory
7964+
7965+
* domain-name
7966+
7967+
* email-addr
7968+
7969+
* file
7970+
7971+
* ipv4-addr
7972+
7973+
* ipv6-addr
7974+
7975+
* mac-addr
7976+
7977+
* mutex
7978+
7979+
* port
7980+
7981+
* process
7982+
7983+
* software
7984+
7985+
* url
7986+
7987+
* user-account
7988+
7989+
* windows-registry-key
7990+
7991+
* x509-certificate
7992+
7993+
type: keyword
7994+
7995+
7996+
7997+
example: `ipv4-addr`
7998+
7999+
| extended
8000+
8001+
// ===============================================================
8002+
77298003
|
77308004
[[field-threat-software-id]]
77318005
<<field-threat-software-id, threat.software.id>>

0 commit comments

Comments
 (0)