Skip to content

Commit 9c63dd5

Browse files
author
djptek
committed
Merge branch 'master' into adjust_field_set_usage_docs
2 parents 28982c6 + 33bce1b commit 9c63dd5

File tree

9 files changed

+578
-10
lines changed

9 files changed

+578
-10
lines changed

CHANGELOG.next.md

Lines changed: 2 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -17,6 +17,7 @@ Thanks, you're awesome :-) -->
1717
#### Added
1818

1919
* Add `orchestrator` fieldset to experimental schema. #1292
20+
* Extend `threat.*` experimental fields with proposed changes from RFC 0018. #1344
2021

2122
#### Improvements
2223

@@ -36,6 +37,7 @@ Thanks, you're awesome :-) -->
3637

3738
#### Improvements
3839

40+
* Support `nested` types in go code generator. #1254
3941
* Go code generator now supports the `flattened` data type. #1302
4042
* Adjustments to use terminology that doesn't have negative connotation. #1315
4143

experimental/generated/beats/fields.ecs.yml

Lines changed: 81 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -6845,6 +6845,41 @@
68456845
can be provided by detecting systems, evaluated at ingest time, or retrospectively
68466846
tagged to events.
68476847
example: MITRE ATT&CK
6848+
- name: group.alias
6849+
level: extended
6850+
type: keyword
6851+
ignore_above: 1024
6852+
description: "The alias(es) of the group for a set of related intrusion activity\
6853+
\ that are tracked by a common name in the security community. While not required,\
6854+
\ you can use a MITRE ATT&CK\xAE group alias(es)."
6855+
example: '[ "Magecart Group 6" ]'
6856+
default_field: false
6857+
- name: group.id
6858+
level: extended
6859+
type: keyword
6860+
ignore_above: 1024
6861+
description: "The id of the group for a set of related intrusion activity that\
6862+
\ are tracked by a common name in the security community. While not required,\
6863+
\ you can use a MITRE ATT&CK\xAE group id."
6864+
example: G0037
6865+
default_field: false
6866+
- name: group.name
6867+
level: extended
6868+
type: keyword
6869+
ignore_above: 1024
6870+
description: "The name of the group for a set of related intrusion activity\
6871+
\ that are tracked by a common name in the security community. While not required,\
6872+
\ you can use a MITRE ATT&CK\xAE group name."
6873+
example: FIN6
6874+
default_field: false
6875+
- name: group.reference
6876+
level: extended
6877+
type: url
6878+
description: "The reference URL of the group for a set of related intrusion\
6879+
\ activity that are tracked by a common name in the security community. While\
6880+
\ not required, you can use a MITRE ATT&CK\xAE group reference URL."
6881+
example: https://attack.mitre.org/groups/G0037/
6882+
default_field: false
68486883
- name: indicator.as.number
68496884
level: extended
68506885
type: long
@@ -7658,6 +7693,52 @@
76587693
\ * x-509-certificate"
76597694
example: ipv4-addr
76607695
default_field: false
7696+
- name: software.id
7697+
level: extended
7698+
type: keyword
7699+
ignore_above: 1024
7700+
description: "The id of the software used by this threat to conduct behavior\
7701+
\ commonly modeled using MITRE ATT&CK\xAE. While not required, you can use\
7702+
\ a MITRE ATT&CK\xAE software id."
7703+
example: S0552
7704+
default_field: false
7705+
- name: software.name
7706+
level: extended
7707+
type: keyword
7708+
ignore_above: 1024
7709+
description: "The name of the software used by this threat to conduct behavior\
7710+
\ commonly modeled using MITRE ATT&CK\xAE. While not required, you can use\
7711+
\ a MITRE ATT&CK\xAE software name."
7712+
example: AdFind
7713+
default_field: false
7714+
- name: software.platforms
7715+
level: extended
7716+
type: keyword
7717+
ignore_above: 1024
7718+
description: "The platform of the software used by this threat to conduct behavior\
7719+
\ commonly modeled using MITRE ATT&CK\xAE. While not required, you can use\
7720+
\ a MITRE ATT&CK\xAE software platform.\nExpected values\n * AWS\n * Azure\n\
7721+
\ * Azure AD\n * GCP\n * Linux\n * macOS\n * Network\n * Office 365\n\
7722+
\ * PRE\n * SaaS\n * Windows"
7723+
example: Windows
7724+
default_field: false
7725+
- name: software.reference
7726+
level: extended
7727+
type: url
7728+
description: "The reference URL of the software used by this threat to conduct\
7729+
\ behavior commonly modeled using MITRE ATT&CK\xAE. While not required, you\
7730+
\ can use a MITRE ATT&CK\xAE software reference URL."
7731+
example: https://attack.mitre.org/software/S0552/
7732+
default_field: false
7733+
- name: software.type
7734+
level: extended
7735+
type: keyword
7736+
ignore_above: 1024
7737+
description: "The type of software used by this threat to conduct behavior commonly\
7738+
\ modeled using MITRE ATT&CK\xAE. While not required, you can use a MITRE\
7739+
\ ATT&CK\xAE software type.\nExpected values\n * Malware\n * Tool"
7740+
example: Tool
7741+
default_field: false
76617742
- name: tactic.id
76627743
level: extended
76637744
type: keyword

experimental/generated/csv/fields.csv

Lines changed: 9 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -802,6 +802,10 @@ ECS_Version,Indexed,Field_Set,Field,Type,Level,Normalization,Example,Description
802802
2.0.0-dev+exp,true,source,source.user.roles,keyword,extended,array,"[""kibana_admin"", ""reporting_user""]",Array of user roles at the time of the event.
803803
2.0.0-dev+exp,true,span,span.id,keyword,extended,,3ff9a8981b7ccd5a,Unique identifier of the span within the scope of its trace.
804804
2.0.0-dev+exp,true,threat,threat.framework,keyword,extended,,MITRE ATT&CK,Threat classification framework.
805+
2.0.0-dev+exp,true,threat,threat.group.alias,keyword,extended,array,"[ ""Magecart Group 6"" ]",Alias of the group.
806+
2.0.0-dev+exp,true,threat,threat.group.id,keyword,extended,,G0037,ID of the group.
807+
2.0.0-dev+exp,true,threat,threat.group.name,keyword,extended,,FIN6,Name of the group.
808+
2.0.0-dev+exp,true,threat,threat.group.reference,url,extended,,https://attack.mitre.org/groups/G0037/,Reference URL of the group.
805809
2.0.0-dev+exp,true,threat,threat.indicator.as.number,long,extended,,15169,Unique number allocated to the autonomous system.
806810
2.0.0-dev+exp,true,threat,threat.indicator.as.organization.name,wildcard,extended,,Google LLC,Organization name.
807811
2.0.0-dev+exp,true,threat,threat.indicator.as.organization.name.text,text,extended,,Google LLC,Organization name.
@@ -914,6 +918,11 @@ ECS_Version,Indexed,Field_Set,Field,Type,Level,Normalization,Example,Description
914918
2.0.0-dev+exp,true,threat,threat.indicator.scanner_stats,long,extended,,4,Scanner statistics
915919
2.0.0-dev+exp,true,threat,threat.indicator.sightings,long,extended,,20,Number of times indicator observed
916920
2.0.0-dev+exp,true,threat,threat.indicator.type,keyword,extended,,ipv4-addr,Type of indicator
921+
2.0.0-dev+exp,true,threat,threat.software.id,keyword,extended,,S0552,ID of the software
922+
2.0.0-dev+exp,true,threat,threat.software.name,keyword,extended,,AdFind,Name of the software.
923+
2.0.0-dev+exp,true,threat,threat.software.platforms,keyword,extended,,Windows,Platform of the software.
924+
2.0.0-dev+exp,true,threat,threat.software.reference,url,extended,,https://attack.mitre.org/software/S0552/,Software reference URL.
925+
2.0.0-dev+exp,true,threat,threat.software.type,keyword,extended,,Tool,Software type.
917926
2.0.0-dev+exp,true,threat,threat.tactic.id,keyword,extended,array,TA0002,Threat tactic id.
918927
2.0.0-dev+exp,true,threat,threat.tactic.name,keyword,extended,array,Execution,Threat tactic.
919928
2.0.0-dev+exp,true,threat,threat.tactic.reference,keyword,extended,array,https://attack.mitre.org/tactics/TA0002/,Threat tactic URL reference.

experimental/generated/ecs/ecs_flat.yml

Lines changed: 118 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -10024,6 +10024,58 @@ threat.framework:
1002410024
normalize: []
1002510025
short: Threat classification framework.
1002610026
type: keyword
10027+
threat.group.alias:
10028+
dashed_name: threat-group-alias
10029+
description: "The alias(es) of the group for a set of related intrusion activity\
10030+
\ that are tracked by a common name in the security community. While not required,\
10031+
\ you can use a MITRE ATT&CK\xAE group alias(es)."
10032+
example: '[ "Magecart Group 6" ]'
10033+
flat_name: threat.group.alias
10034+
ignore_above: 1024
10035+
level: extended
10036+
name: group.alias
10037+
normalize:
10038+
- array
10039+
short: Alias of the group.
10040+
type: keyword
10041+
threat.group.id:
10042+
dashed_name: threat-group-id
10043+
description: "The id of the group for a set of related intrusion activity that are\
10044+
\ tracked by a common name in the security community. While not required, you\
10045+
\ can use a MITRE ATT&CK\xAE group id."
10046+
example: G0037
10047+
flat_name: threat.group.id
10048+
ignore_above: 1024
10049+
level: extended
10050+
name: group.id
10051+
normalize: []
10052+
short: ID of the group.
10053+
type: keyword
10054+
threat.group.name:
10055+
dashed_name: threat-group-name
10056+
description: "The name of the group for a set of related intrusion activity that\
10057+
\ are tracked by a common name in the security community. While not required,\
10058+
\ you can use a MITRE ATT&CK\xAE group name."
10059+
example: FIN6
10060+
flat_name: threat.group.name
10061+
ignore_above: 1024
10062+
level: extended
10063+
name: group.name
10064+
normalize: []
10065+
short: Name of the group.
10066+
type: keyword
10067+
threat.group.reference:
10068+
dashed_name: threat-group-reference
10069+
description: "The reference URL of the group for a set of related intrusion activity\
10070+
\ that are tracked by a common name in the security community. While not required,\
10071+
\ you can use a MITRE ATT&CK\xAE group reference URL."
10072+
example: https://attack.mitre.org/groups/G0037/
10073+
flat_name: threat.group.reference
10074+
level: extended
10075+
name: group.reference
10076+
normalize: []
10077+
short: Reference URL of the group.
10078+
type: url
1002710079
threat.indicator.as.number:
1002810080
dashed_name: threat-indicator-as-number
1002910081
description: Unique number allocated to the autonomous system. The autonomous system
@@ -11374,6 +11426,72 @@ threat.indicator.type:
1137411426
normalize: []
1137511427
short: Type of indicator
1137611428
type: keyword
11429+
threat.software.id:
11430+
dashed_name: threat-software-id
11431+
description: "The id of the software used by this threat to conduct behavior commonly\
11432+
\ modeled using MITRE ATT&CK\xAE. While not required, you can use a MITRE ATT&CK\xAE\
11433+
\ software id."
11434+
example: S0552
11435+
flat_name: threat.software.id
11436+
ignore_above: 1024
11437+
level: extended
11438+
name: software.id
11439+
normalize: []
11440+
short: ID of the software
11441+
type: keyword
11442+
threat.software.name:
11443+
dashed_name: threat-software-name
11444+
description: "The name of the software used by this threat to conduct behavior commonly\
11445+
\ modeled using MITRE ATT&CK\xAE. While not required, you can use a MITRE ATT&CK\xAE\
11446+
\ software name."
11447+
example: AdFind
11448+
flat_name: threat.software.name
11449+
ignore_above: 1024
11450+
level: extended
11451+
name: software.name
11452+
normalize: []
11453+
short: Name of the software.
11454+
type: keyword
11455+
threat.software.platforms:
11456+
dashed_name: threat-software-platforms
11457+
description: "The platform of the software used by this threat to conduct behavior\
11458+
\ commonly modeled using MITRE ATT&CK\xAE. While not required, you can use a MITRE\
11459+
\ ATT&CK\xAE software platform.\nExpected values\n * AWS\n * Azure\n * Azure\
11460+
\ AD\n * GCP\n * Linux\n * macOS\n * Network\n * Office 365\n * PRE\n *\
11461+
\ SaaS\n * Windows"
11462+
example: Windows
11463+
flat_name: threat.software.platforms
11464+
ignore_above: 1024
11465+
level: extended
11466+
name: software.platforms
11467+
normalize: []
11468+
short: Platform of the software.
11469+
type: keyword
11470+
threat.software.reference:
11471+
dashed_name: threat-software-reference
11472+
description: "The reference URL of the software used by this threat to conduct behavior\
11473+
\ commonly modeled using MITRE ATT&CK\xAE. While not required, you can use a MITRE\
11474+
\ ATT&CK\xAE software reference URL."
11475+
example: https://attack.mitre.org/software/S0552/
11476+
flat_name: threat.software.reference
11477+
level: extended
11478+
name: software.reference
11479+
normalize: []
11480+
short: Software reference URL.
11481+
type: url
11482+
threat.software.type:
11483+
dashed_name: threat-software-type
11484+
description: "The type of software used by this threat to conduct behavior commonly\
11485+
\ modeled using MITRE ATT&CK\xAE. While not required, you can use a MITRE ATT&CK\xAE\
11486+
\ software type.\nExpected values\n * Malware\n * Tool"
11487+
example: Tool
11488+
flat_name: threat.software.type
11489+
ignore_above: 1024
11490+
level: extended
11491+
name: software.type
11492+
normalize: []
11493+
short: Software type.
11494+
type: keyword
1137711495
threat.tactic.id:
1137811496
dashed_name: threat-tactic-id
1137911497
description: "The id of tactic used by this threat. You can use a MITRE ATT&CK\xAE\

experimental/generated/ecs/ecs_nested.yml

Lines changed: 118 additions & 0 deletions
Original file line numberDiff line numberDiff line change
@@ -12030,6 +12030,58 @@ threat:
1203012030
normalize: []
1203112031
short: Threat classification framework.
1203212032
type: keyword
12033+
threat.group.alias:
12034+
dashed_name: threat-group-alias
12035+
description: "The alias(es) of the group for a set of related intrusion activity\
12036+
\ that are tracked by a common name in the security community. While not required,\
12037+
\ you can use a MITRE ATT&CK\xAE group alias(es)."
12038+
example: '[ "Magecart Group 6" ]'
12039+
flat_name: threat.group.alias
12040+
ignore_above: 1024
12041+
level: extended
12042+
name: group.alias
12043+
normalize:
12044+
- array
12045+
short: Alias of the group.
12046+
type: keyword
12047+
threat.group.id:
12048+
dashed_name: threat-group-id
12049+
description: "The id of the group for a set of related intrusion activity that\
12050+
\ are tracked by a common name in the security community. While not required,\
12051+
\ you can use a MITRE ATT&CK\xAE group id."
12052+
example: G0037
12053+
flat_name: threat.group.id
12054+
ignore_above: 1024
12055+
level: extended
12056+
name: group.id
12057+
normalize: []
12058+
short: ID of the group.
12059+
type: keyword
12060+
threat.group.name:
12061+
dashed_name: threat-group-name
12062+
description: "The name of the group for a set of related intrusion activity\
12063+
\ that are tracked by a common name in the security community. While not required,\
12064+
\ you can use a MITRE ATT&CK\xAE group name."
12065+
example: FIN6
12066+
flat_name: threat.group.name
12067+
ignore_above: 1024
12068+
level: extended
12069+
name: group.name
12070+
normalize: []
12071+
short: Name of the group.
12072+
type: keyword
12073+
threat.group.reference:
12074+
dashed_name: threat-group-reference
12075+
description: "The reference URL of the group for a set of related intrusion\
12076+
\ activity that are tracked by a common name in the security community. While\
12077+
\ not required, you can use a MITRE ATT&CK\xAE group reference URL."
12078+
example: https://attack.mitre.org/groups/G0037/
12079+
flat_name: threat.group.reference
12080+
level: extended
12081+
name: group.reference
12082+
normalize: []
12083+
short: Reference URL of the group.
12084+
type: url
1203312085
threat.indicator.as.number:
1203412086
dashed_name: threat-indicator-as-number
1203512087
description: Unique number allocated to the autonomous system. The autonomous
@@ -13383,6 +13435,72 @@ threat:
1338313435
normalize: []
1338413436
short: Type of indicator
1338513437
type: keyword
13438+
threat.software.id:
13439+
dashed_name: threat-software-id
13440+
description: "The id of the software used by this threat to conduct behavior\
13441+
\ commonly modeled using MITRE ATT&CK\xAE. While not required, you can use\
13442+
\ a MITRE ATT&CK\xAE software id."
13443+
example: S0552
13444+
flat_name: threat.software.id
13445+
ignore_above: 1024
13446+
level: extended
13447+
name: software.id
13448+
normalize: []
13449+
short: ID of the software
13450+
type: keyword
13451+
threat.software.name:
13452+
dashed_name: threat-software-name
13453+
description: "The name of the software used by this threat to conduct behavior\
13454+
\ commonly modeled using MITRE ATT&CK\xAE. While not required, you can use\
13455+
\ a MITRE ATT&CK\xAE software name."
13456+
example: AdFind
13457+
flat_name: threat.software.name
13458+
ignore_above: 1024
13459+
level: extended
13460+
name: software.name
13461+
normalize: []
13462+
short: Name of the software.
13463+
type: keyword
13464+
threat.software.platforms:
13465+
dashed_name: threat-software-platforms
13466+
description: "The platform of the software used by this threat to conduct behavior\
13467+
\ commonly modeled using MITRE ATT&CK\xAE. While not required, you can use\
13468+
\ a MITRE ATT&CK\xAE software platform.\nExpected values\n * AWS\n * Azure\n\
13469+
\ * Azure AD\n * GCP\n * Linux\n * macOS\n * Network\n * Office 365\n\
13470+
\ * PRE\n * SaaS\n * Windows"
13471+
example: Windows
13472+
flat_name: threat.software.platforms
13473+
ignore_above: 1024
13474+
level: extended
13475+
name: software.platforms
13476+
normalize: []
13477+
short: Platform of the software.
13478+
type: keyword
13479+
threat.software.reference:
13480+
dashed_name: threat-software-reference
13481+
description: "The reference URL of the software used by this threat to conduct\
13482+
\ behavior commonly modeled using MITRE ATT&CK\xAE. While not required, you\
13483+
\ can use a MITRE ATT&CK\xAE software reference URL."
13484+
example: https://attack.mitre.org/software/S0552/
13485+
flat_name: threat.software.reference
13486+
level: extended
13487+
name: software.reference
13488+
normalize: []
13489+
short: Software reference URL.
13490+
type: url
13491+
threat.software.type:
13492+
dashed_name: threat-software-type
13493+
description: "The type of software used by this threat to conduct behavior commonly\
13494+
\ modeled using MITRE ATT&CK\xAE. While not required, you can use a MITRE\
13495+
\ ATT&CK\xAE software type.\nExpected values\n * Malware\n * Tool"
13496+
example: Tool
13497+
flat_name: threat.software.type
13498+
ignore_above: 1024
13499+
level: extended
13500+
name: software.type
13501+
normalize: []
13502+
short: Software type.
13503+
type: keyword
1338613504
threat.tactic.id:
1338713505
dashed_name: threat-tactic-id
1338813506
description: "The id of tactic used by this threat. You can use a MITRE ATT&CK\xAE\

0 commit comments

Comments
 (0)