Skip to content
Merged
Show file tree
Hide file tree
Changes from all commits
Commits
File filter

Filter by extension

Filter by extension

Conversations
Failed to load comments.
Loading
Jump to
Jump to file
Failed to load files.
Loading
Diff view
Diff view
1 change: 1 addition & 0 deletions CHANGELOG.next.md
Original file line number Diff line number Diff line change
Expand Up @@ -68,6 +68,7 @@ Thanks, you're awesome :-) -->

* Swap `Location` and `Field Set` columns in `Field Reuse` table for better readability. #1472, #1476
* Use a bullet points to list field reuses. #1473
* Improve wording in `Threat` schema #1505

<!-- All empty sections:

Expand Down
6 changes: 3 additions & 3 deletions code/go/ecs/threat.go

Some generated files are not rendered by default. Learn more about how customized files appear on GitHub.

2 changes: 1 addition & 1 deletion docs/field-details.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -7652,7 +7652,7 @@ example: `co.uk`

Fields to classify events and alerts according to a threat taxonomy such as the MITRE ATT&CK® framework.

These fields are for users to classify alerts from all of their sources (e.g. IDS, NGFW, etc.) within a common taxonomy. The threat.tactic.* are meant to capture the high level category of the threat (e.g. "impact"). The threat.technique.* fields are meant to capture which kind of approach is used by this detected threat, to accomplish the goal (e.g. "endpoint denial of service").
These fields are for users to classify alerts from all of their sources (e.g. IDS, NGFW, etc.) within a common taxonomy. The threat.tactic.* fields are meant to capture the high level category of the threat (e.g. "impact"). The threat.technique.* fields are meant to capture which kind of approach is used by this detected threat, to accomplish the goal (e.g. "endpoint denial of service").

[discrete]
==== Threat Field Details
Expand Down
8 changes: 4 additions & 4 deletions experimental/generated/beats/fields.ecs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -8171,10 +8171,10 @@
description: "Fields to classify events and alerts according to a threat taxonomy\
\ such as the MITRE ATT&CK\xAE framework.\nThese fields are for users to classify\
\ alerts from all of their sources (e.g. IDS, NGFW, etc.) within a common taxonomy.\
\ The threat.tactic.* are meant to capture the high level category of the threat\
\ (e.g. \"impact\"). The threat.technique.* fields are meant to capture which\
\ kind of approach is used by this detected threat, to accomplish the goal (e.g.\
\ \"endpoint denial of service\")."
\ The threat.tactic.* fields are meant to capture the high level category of\
\ the threat (e.g. \"impact\"). The threat.technique.* fields are meant to capture\
\ which kind of approach is used by this detected threat, to accomplish the\
\ goal (e.g. \"endpoint denial of service\")."
type: group
fields:
- name: enrichments
Expand Down
8 changes: 4 additions & 4 deletions experimental/generated/ecs/ecs_nested.yml
Original file line number Diff line number Diff line change
Expand Up @@ -14326,10 +14326,10 @@ threat:
description: "Fields to classify events and alerts according to a threat taxonomy\
\ such as the MITRE ATT&CK\xAE framework.\nThese fields are for users to classify\
\ alerts from all of their sources (e.g. IDS, NGFW, etc.) within a common taxonomy.\
\ The threat.tactic.* are meant to capture the high level category of the threat\
\ (e.g. \"impact\"). The threat.technique.* fields are meant to capture which\
\ kind of approach is used by this detected threat, to accomplish the goal (e.g.\
\ \"endpoint denial of service\")."
\ The threat.tactic.* fields are meant to capture the high level category of the\
\ threat (e.g. \"impact\"). The threat.technique.* fields are meant to capture\
\ which kind of approach is used by this detected threat, to accomplish the goal\
\ (e.g. \"endpoint denial of service\")."
fields:
threat.enrichments:
beta: This field is beta and subject to change.
Expand Down
8 changes: 4 additions & 4 deletions generated/beats/fields.ecs.yml
Original file line number Diff line number Diff line change
Expand Up @@ -5839,10 +5839,10 @@
description: "Fields to classify events and alerts according to a threat taxonomy\
\ such as the MITRE ATT&CK\xAE framework.\nThese fields are for users to classify\
\ alerts from all of their sources (e.g. IDS, NGFW, etc.) within a common taxonomy.\
\ The threat.tactic.* are meant to capture the high level category of the threat\
\ (e.g. \"impact\"). The threat.technique.* fields are meant to capture which\
\ kind of approach is used by this detected threat, to accomplish the goal (e.g.\
\ \"endpoint denial of service\")."
\ The threat.tactic.* fields are meant to capture the high level category of\
\ the threat (e.g. \"impact\"). The threat.technique.* fields are meant to capture\
\ which kind of approach is used by this detected threat, to accomplish the\
\ goal (e.g. \"endpoint denial of service\")."
type: group
fields:
- name: enrichments
Expand Down
8 changes: 4 additions & 4 deletions generated/ecs/ecs_nested.yml
Original file line number Diff line number Diff line change
Expand Up @@ -10204,10 +10204,10 @@ threat:
description: "Fields to classify events and alerts according to a threat taxonomy\
\ such as the MITRE ATT&CK\xAE framework.\nThese fields are for users to classify\
\ alerts from all of their sources (e.g. IDS, NGFW, etc.) within a common taxonomy.\
\ The threat.tactic.* are meant to capture the high level category of the threat\
\ (e.g. \"impact\"). The threat.technique.* fields are meant to capture which\
\ kind of approach is used by this detected threat, to accomplish the goal (e.g.\
\ \"endpoint denial of service\")."
\ The threat.tactic.* fields are meant to capture the high level category of the\
\ threat (e.g. \"impact\"). The threat.technique.* fields are meant to capture\
\ which kind of approach is used by this detected threat, to accomplish the goal\
\ (e.g. \"endpoint denial of service\")."
fields:
threat.enrichments:
beta: This field is beta and subject to change.
Expand Down
2 changes: 1 addition & 1 deletion schemas/threat.yml
Original file line number Diff line number Diff line change
Expand Up @@ -7,7 +7,7 @@
Fields to classify events and alerts according to a threat taxonomy such as the MITRE ATT&CK® framework.

These fields are for users to classify alerts from all of their sources (e.g. IDS, NGFW, etc.) within a
common taxonomy. The threat.tactic.* are meant to capture the high level category of the threat
common taxonomy. The threat.tactic.* fields are meant to capture the high level category of the threat
(e.g. "impact"). The threat.technique.* fields are meant to capture which kind of approach is used by
this detected threat, to accomplish the goal (e.g. "endpoint denial of service").

Expand Down