diff --git a/rfcs/text/0048-fileorigin-fields.md b/rfcs/text/0048-fileorigin-fields.md index 85622991b7..4df7c5ef7f 100644 --- a/rfcs/text/0048-fileorigin-fields.md +++ b/rfcs/text/0048-fileorigin-fields.md @@ -1,8 +1,8 @@ # 0048: File Origin Fields -- Stage: **0 (strawperson)** -- Date: **2024-10-15** +- Stage: **1 (Draft)** +- Date: **2024-XX-XX** +* File + * A file open event may be generated when a file is opened. By including the file's origin information in the event, the system can assess whether the file might be malware downloaded from a malicious website based on those URLs. +* Process + * Generally, a process is generated from an executable file. However, there's a possibility that the executable file originating the process could be malware. To enhance security, we aim to include the executable file’s origin information at the process creation event and use the origin URL to help determine if the file is malicious. +* DLL + * A process may load DLLs (libraries) as needed. However, there are cases where a malicious DLL prepared by an attacker might be loaded. To enhance security, we would like to check whether the loaded DLL was downloaded from the internet and, if so, where it was downloaded from. This information can help in determining whether the loaded DLL is malicious. + ## Source data +Example sources of data is shown in the above. + @@ -135,7 +141,7 @@ e.g.: -* Stage 0: https://github.com/elastic/ecs/pull/2387 +* Stage 1: https://github.com/elastic/ecs/pull/2395