Skip to content

[RFC] Threat Intel - Stage 1 #1127

New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Merged
merged 53 commits into from
Feb 18, 2021
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
Show all changes
53 commits
Select commit Hold shift + click to select a range
baa1eca
Merge pull request #2 from elastic/master
shimonmodi Nov 16, 2020
dfbf67c
Update 0008-threat-intel.md
shimonmodi Nov 16, 2020
7803e5a
Update 0008-threat-intel.md
shimonmodi Nov 16, 2020
efb02e9
Update rfcs/text/0008-threat-intel.md
peasead Nov 20, 2020
5b82639
Update rfcs/text/0008-threat-intel.md
peasead Nov 20, 2020
2f69cb3
Update 0008-threat-intel.md
shimonmodi Dec 1, 2020
5f092fe
Update rfcs/text/0008-threat-intel.md
shimonmodi Dec 1, 2020
2b8435b
Update 0008-threat-intel.md
shimonmodi Dec 2, 2020
a6f259d
Update 0008-threat-intel.md
shimonmodi Dec 2, 2020
6e862d0
Update 0008-threat-intel.md
shimonmodi Dec 2, 2020
b6888c0
Update rfcs/text/0008-threat-intel.md
peasead Dec 10, 2020
9cd8566
Update rfcs/text/0008-threat-intel.md
peasead Dec 10, 2020
a5d35d6
Update rfcs/text/0008-threat-intel.md
peasead Dec 10, 2020
388f597
Update rfcs/text/0008-threat-intel.md
peasead Dec 10, 2020
27351ab
Update rfcs/text/0008-threat-intel.md
peasead Dec 10, 2020
334e4b3
Update rfcs/text/0008-threat-intel.md
peasead Dec 10, 2020
125e0ec
Update rfcs/text/0008-threat-intel.md
peasead Dec 10, 2020
ba183bc
Update 0008-threat-intel.md
peasead Dec 10, 2020
8f747a8
Update rfcs/text/0008-threat-intel.md
peasead Dec 10, 2020
66e2316
Update rfcs/text/0008-threat-intel.md
shimonmodi Dec 11, 2020
ef15427
Update rfcs/text/0008-threat-intel.md
shimonmodi Dec 12, 2020
cbff9b0
Update rfcs/text/0008-threat-intel.md
shimonmodi Dec 15, 2020
f7ae6ad
Update rfcs/text/0008-threat-intel.md
shimonmodi Dec 15, 2020
d3ab9e7
Update rfcs/text/0008-threat-intel.md
shimonmodi Dec 15, 2020
993278d
Update 0008-threat-intel.md
shimonmodi Dec 15, 2020
3464735
Updated formatting of examples
dcode Dec 15, 2020
1347f2b
added threat.yml
peasead Dec 17, 2020
be09751
Update threat.yml
peasead Jan 4, 2021
32bfbed
Update 0008-threat-intel.md
peasead Jan 4, 2021
4f3315c
Made updates per 1/4 call
dcode Jan 5, 2021
14c23ee
Update threat.yml
peasead Jan 5, 2021
b0aa7f9
Update 0008-threat-intel.md
peasead Jan 5, 2021
87a1baf
updated ioc to indicator, add confidence, define direction artifacts
peasead Jan 12, 2021
1d54490
updated existing ecs fields table
peasead Jan 13, 2021
660437e
Update rfcs/text/0008-threat-intel.md
peasead Jan 14, 2021
74bd523
Update rfcs/text/0008/threat.yml
peasead Jan 14, 2021
ebc9189
Update threat.yml
peasead Jan 14, 2021
b1d2969
Update 0008-threat-intel.md
peasead Jan 14, 2021
c04bc8e
added as and geo.yml reusable docs
peasead Jan 15, 2021
873e4e7
updated .matched objects
peasead Jan 15, 2021
87eb91a
Update rfcs/text/0008-threat-intel.md
peasead Jan 21, 2021
18979f2
ecs housekeeping edits
ebeahan Jan 21, 2021
ecc19b9
revert to indicator.email.address
ebeahan Jan 27, 2021
211e4bf
added all reuse fields, removed functional fields
peasead Jan 28, 2021
34d17b8
updated md to include .matched.type
peasead Jan 29, 2021
1b4b367
extended descriptions for yml
peasead Feb 5, 2021
6f87079
Fix errant whitespace characters
rylnd Feb 11, 2021
12b77e5
Update 0008-threat-intel.md
peasead Feb 16, 2021
d12b770
update stage name
ebeahan Feb 17, 2021
22e655e
update PR link to reflect stage 1
ebeahan Feb 17, 2021
f1308c0
add sponsor
ebeahan Feb 17, 2021
7223d56
set advancing date
ebeahan Feb 17, 2021
2be63a6
update date
ebeahan Feb 18, 2021
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
386 changes: 332 additions & 54 deletions rfcs/text/0008-threat-intel.md

Large diffs are not rendered by default.

5 changes: 5 additions & 0 deletions rfcs/text/0008/as.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
- name: as
reusable:
expected:
- threat.indicator
5 changes: 5 additions & 0 deletions rfcs/text/0008/file.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
- name: file
reusable:
expected:
- threat.indicator
5 changes: 5 additions & 0 deletions rfcs/text/0008/geo.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
- name: geo
reusable:
expected:
- threat.indicator
5 changes: 5 additions & 0 deletions rfcs/text/0008/hash.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
- name: hash
reusable:
expected:
- threat.indicator
5 changes: 5 additions & 0 deletions rfcs/text/0008/pe.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
- name: pe
reusable:
expected:
- threat.indicator
5 changes: 5 additions & 0 deletions rfcs/text/0008/registry.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
- name: registry
reusable:
expected:
- threat.indicator
196 changes: 196 additions & 0 deletions rfcs/text/0008/threat.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,196 @@
---
- name: threat

fields:

- name: indicator.first_seen
level: extended
type: date
short: Date/time indicator was first reported.
description: >
The date and time when intelligence source first reported sighting this indicator.

example: "2020-11-05T17:25:47.000Z"

- name: indicator.last_seen
level: extended
type: date
short: Date/time indicator was last reported.
description: >
The date and time when intelligence source last reported sighting this indicator.

example: "2020-11-05T17:25:47.000Z"

- name: indicator.sightings
level: extended
type: long
short: Number of times indicator observed
description: >
Number of times this indicator was observed conducting threat activity.

example: 20

- name: indicator.type
level: extended
type: keyword
short: Type of indicator
description: >
Type of indicator as represented by Cyber Observable in STIX 2.0.

Expected values
* autonomous-system
* artifact
* directory
* domain-name
* email-addr
* file
* ipv4-addr
* ipv6-addr
* mac-addr
* mutex
* process
* software
* url
* user-account
* windows-registry-key
* x-509-certificate

example: ipv4-addr

- name: indicator.description
level: extended
type: wildcard
short: Indicator description
description: >
Describes the type of action conducted by the threat.

example: IP x.x.x.x was observed delivering the Angler EK.

- name: indicator.scanner_stats
level: extended
type: long
short: Scanner statistics
description: >
Count of AV/EDR vendors that successfully detected malicious file or URL.

example: 4

- name: indicator.provider
level: extended
type: keyword
description: >
Identifies the name of the intelligence provider.

example: VirusTotal

- name: indicator.confidence
level: extended
type: keyword
short: Indicator confidence rating
description: >
Identifies the confidence rating assigned by the provider using STIX confidence scales.

Expected values:
* Not Specified, None, Low, Medium, High
* 0-10
* Admirality Scale (1-6)
* DNI Scale (5-95)
* WEP Scale (Impossible - Certain)

example: High

- name: indicator.module
level: extended
type: keyword
short: Indicator module
description: >
Identifies the name of specific module this data is coming from.

example: threatintel

- name: indicator.dataset
level: extended
type: keyword
short: Indicator dataset
description: >
Identifies the name of specific dataset from the intelligence source.

example: threatintel.abusemalware

- name: indicator.ip
level: extended
type: ip
short: Indicator IP address
description: >
Identifies a threat indicator as an IP address (irrespective of direction).

example: 1.2.3.4

- name: indicator.domain
level: extended
type: keyword
short: Indicator domain name
description: >
Identifies a threat indicator as a domain (irrespective of direction).

example: example.com

- name: indicator.port
level: extended
type: long
short: Indicator port
description: >
Identifies a threat indicator as a port number (irrespective of direction).

example: 443

- name: indicator.email.address
level: extended
type: keyword
short: Indicator email address
description: >
Identifies a threat indicator as an email address (irrespective of direction).

example: phish@example.com

- name: indicator.marking.tlp
level: extended
type: keyword
short: Indicator TLP marking
description: >
Traffic Light Protocol sharing markings.

Expected values are:
* White
* Green
* Amber
* Red

example: White

- name: indicator.matched.atomic
level: extended
type: keyword
short: Indicator atomic match
description: >
Identifies the atomic indicator that matched a local environment endpoint or network event.

example: example.com

- name: indicator.matched.field
level: extended
type: keyword
short: Indicator field match
description: >
Identifies the field of the atomic indicator that matched a local environment endpoint or network event.

example: file.hash.sha256

- name: indicator.matched.type
level: extended
type: keyword
short: Indicator type match
description: >
Identifies the type of the atomic indicator that matched a local environment endpoint or network event.

example: domain-name
5 changes: 5 additions & 0 deletions rfcs/text/0008/url.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
- name: url
reusable:
expected:
- threat.indicator
5 changes: 5 additions & 0 deletions rfcs/text/0008/x509.yml
Original file line number Diff line number Diff line change
@@ -0,0 +1,5 @@
---
- name: x509
reusable:
expected:
- threat.indicator