From 5d56bfbc0fb79457a1e57a33f9d6d2d1b700ce2b Mon Sep 17 00:00:00 2001 From: shimonmodi Date: Sun, 27 Sep 2020 22:36:50 -0700 Subject: [PATCH 1/4] 0000-threat-intel.md Stage 0 submission for threat intelligence --- rfcs/0000-threat-intel.md | 119 ++++++++++++++++++++++++++++++++++++++ 1 file changed, 119 insertions(+) create mode 100644 rfcs/0000-threat-intel.md diff --git a/rfcs/0000-threat-intel.md b/rfcs/0000-threat-intel.md new file mode 100644 index 0000000000..a2741cdbd8 --- /dev/null +++ b/rfcs/0000-threat-intel.md @@ -0,0 +1,119 @@ +# 0000: Cyber Threat Intelligence Fields + + +- Stage: **0 (strawperson)** +- Date: **TBD** + +Elastic Security Solution will be adding the capability to ingest, process and utilize threat intelligence information for increasing detection coverage and helping analysts making quicker investigation decisions. Threat intelligence can be collected from a number of sources with a variety of structured and semi-structured data representations. This makes threat intelligence an ideal candidate for ECS mappings. Threat intelligence data will require ECS mappings to normalize it and make it usable in our security solution. This RFC is focused on identifying new field sets and values that need to be created for threat intelligence data. The goal is to utilize [STIX Cyber Observable data model](https://docs.oasis-open.org/cti/stix/v2.1/cs01/stix-v2.1-cs01.html#_mlbmudhl16lr) as a foundation for these new fields. + + + + + +## Fields + + + + + + + +## Usage + + + +## Source data + + + + + + + +## Scope of impact + + + +## Concerns + + + + + + + + + +## Real-world implementations + + + +## People + +The following are the people that consulted on the contents of this RFC. + +@Shimon | author + + + + +## References + +[Threat Intel Field Set Draft](https://docs.google.com/spreadsheets/d/1hS3tF-sGmwnKb7uUGLo3Rng_q6EFgwo6UCae8Sp4E-g/edit?usp=sharing) + + +### RFC Pull Requests + + + +* Stage 0: https://github.com/elastic/ecs/pull/NNN + + From e548fb16d6894c6a7b3274d03ff6240ffd7efcfc Mon Sep 17 00:00:00 2001 From: shimonmodi Date: Wed, 14 Oct 2020 09:39:56 -0700 Subject: [PATCH 2/4] Update rfcs/0000-threat-intel.md Co-authored-by: Eric Beahan --- rfcs/0000-threat-intel.md | 2 +- 1 file changed, 1 insertion(+), 1 deletion(-) diff --git a/rfcs/0000-threat-intel.md b/rfcs/0000-threat-intel.md index a2741cdbd8..9fee33f1c6 100644 --- a/rfcs/0000-threat-intel.md +++ b/rfcs/0000-threat-intel.md @@ -111,7 +111,7 @@ e.g.: -* Stage 0: https://github.com/elastic/ecs/pull/NNN +* Stage 0: https://github.com/elastic/ecs/pull/986 - Date: **TBD** -Elastic Security Solution will be adding the capability to ingest, process and utilize threat intelligence information for increasing detection coverage and helping analysts making quicker investigation decisions. Threat intelligence can be collected from a number of sources with a variety of structured and semi-structured data representations. This makes threat intelligence an ideal candidate for ECS mappings. Threat intelligence data will require ECS mappings to normalize it and make it usable in our security solution. This RFC is focused on identifying new field sets and values that need to be created for threat intelligence data. The goal is to utilize [STIX Cyber Observable data model](https://docs.oasis-open.org/cti/stix/v2.1/cs01/stix-v2.1-cs01.html#_mlbmudhl16lr) as a foundation for these new fields. +Elastic Security Solution will be adding the capability to ingest, process and utilize threat intelligence information for increasing detection coverage and helping analysts making quicker investigation decisions. Threat intelligence can be collected from a number of sources with a variety of structured and semi-structured data representations. This makes threat intelligence an ideal candidate for ECS mappings. Threat intelligence data will require ECS mappings to normalize it and make it usable in our security solution. This RFC is focused on identifying new field sets and values that need to be created for threat intelligence data. Existing ECS field reuse will be prioritized where possible. If new fields are required we will utilize [STIX Cyber Observable data model](https://docs.oasis-open.org/cti/stix/v2.1/cs01/stix-v2.1-cs01.html#_mlbmudhl16lr) as guidance. - Stage: **0 (strawperson)** -- Date: **TBD** +- Date: **2020-10-15** -Elastic Security Solution will be adding the capability to ingest, process and utilize threat intelligence information for increasing detection coverage and helping analysts making quicker investigation decisions. Threat intelligence can be collected from a number of sources with a variety of structured and semi-structured data representations. This makes threat intelligence an ideal candidate for ECS mappings. Threat intelligence data will require ECS mappings to normalize it and make it usable in our security solution. This RFC is focused on identifying new field sets and values that need to be created for threat intelligence data. Existing ECS field reuse will be prioritized where possible. If new fields are required we will utilize [STIX Cyber Observable data model](https://docs.oasis-open.org/cti/stix/v2.1/cs01/stix-v2.1-cs01.html#_mlbmudhl16lr) as guidance. +Elastic Security Solution will be adding the capability to ingest, process and utilize threat intelligence information for increasing detection coverage and helping analysts making quicker investigation decisions. Threat intelligence can be collected from a number of sources with a variety of structured and semi-structured data representations. This makes threat intelligence an ideal candidate for ECS mappings. Threat intelligence data will require ECS mappings to normalize it and make it usable in our security solution. This RFC is focused on identifying new field sets and values that need to be created for threat intelligence data. Existing ECS field reuse will be prioritized where possible. If new fields are required we will utilize [STIX Cyber Observable data model](https://docs.oasis-open.org/cti/stix/v2.1/cs01/stix-v2.1-cs01.html#_mlbmudhl16lr) as guidance.