diff --git a/rfcs/text/0008-threat-intel.md b/rfcs/text/0008-threat-intel.md index 1e12232415..4560c0cf85 100644 --- a/rfcs/text/0008-threat-intel.md +++ b/rfcs/text/0008-threat-intel.md @@ -1,8 +1,8 @@ # 0008: Cyber Threat Intelligence Fields -- Stage: **0 (strawperson)** -- Date: **2020-10-15** +- Stage: **1 (proposal)** +- Date: **2020-10-15** Elastic Security Solution will be adding the capability to ingest, process and utilize threat intelligence information for increasing detection coverage and helping analysts making quicker investigation decisions. Threat intelligence can be collected from a number of sources with a variety of structured and semi-structured data representations. This makes threat intelligence an ideal candidate for ECS mappings. Threat intelligence data will require ECS mappings to normalize it and make it usable in our security solution. This RFC is focused on identifying new field sets and values that need to be created for threat intelligence data. Existing ECS field reuse will be prioritized where possible. If new fields are required we will utilize [STIX Cyber Observable data model](https://docs.oasis-open.org/cti/stix/v2.1/cs01/stix-v2.1-cs01.html#_mlbmudhl16lr) as guidance. @@ -11,10 +11,6 @@ As you work on your RFC, use the "Stage N" comments to guide you in what you sho Feel free to remove these comments as you go along. --> - - ## Fields * Stage 0: https://github.com/elastic/ecs/pull/986 - - +* Stage 1: https://github.com/elastic/ecs/pull/1037