-
Notifications
You must be signed in to change notification settings - Fork 431
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
Introduce display_name for threat.indicator #1998
Comments
@jamiehynds fyi, following up on our discussion |
I think that Also, here's the |
Thanks for the comments, I agree that |
Yep, you're following the schema properly! Back story We felt that ECS fieldsets that incorporate directionality ( Contextually, it could be both - so if threat provider A marked it as a source and threat provider B marked it as a destination; you could have duplicate threat indicator matches or worse, contextually incorrect assumptions based on how someone viewed the directionality. We opted to avoid the confusion of directionality by not including it and doing Commentary |
@peasead Thanks a lot for the Back Story, it answers a lot of questions that I had as I wasn't really thinking about the directionality of the indicators. It makes total sense! So I think it should stay the way it is now, meaning for
Can you clarify so we are on the same page? |
I think you can disregard that. I didn't fully grasp what you were asking until I started the larger response. Sorry! |
@jamiehynds can you help me find the right people to ping on this issue so we move forward with it? |
@maxcold based on the discussions above with @peasead, do you think Could you also provide a proposal for the field description and allowed values, which we'd include in the ECS documentation? As an example, here's the description and allowed values for an upcoming addition to @ebeahan given that this proposal is a relatively minor change, I'm assuming an RFC isn't warranted, but pinging you just incase you feel otherwise. |
@maxcold is it likely that e.g. If, so, we'd perhaps want to consider adding
where
|
@jamiehynds yes, I think it makes sense to have @djptek good point, I think it makes sense to add |
You can specify expected values in the schema |
@djptek thanks for providing an example. One question, you linked to
"to be" state with the new field populated
for a file type indicator
"to be" state with the new field populated
|
Hi @maxcold sorry, I gave completely the wrong example there. I intended to give an example for expected_values (optional): An array of expected values for the field. Schema consumers can validate integrations and mapped data against the listed values. These values are the recommended convention, but users may also use other values. From your examples:
I think |
@djptek no worries, I didn't know about |
@maxcold This is not the same as |
@djptek got it, thanks!
@jamiehynds anything else I can do to help moving it forward? |
hi @jamiehynds , as we are coming closer to the 8.6 release cycle anything we can help with to get this on the roadmap for the release? |
@ebeahan @jamiehynds @djptek hey folks, what can our team do to help move this forward? |
@maxcold sorry for missing the ping before. Is this summary still the direction we're taking: #1998 (comment)? If so, the next steps would be for someone on your team to open a PR with the requested changes, and we'll review and discuss further as needed. |
@ebeahan yes, that's still the idea. I will add an issue of creating a PR to ECS schema to our backlog then. What about changes in the ti_* integrations? It would be good if these integration populate the field automatically, how do we make this happen? |
@ebeahan btw what is usually the approach for backfilling the data if a new ECS field is introduced (or if there is another change in the schema)? Is there a common way to handle such cases? Specifically for |
@maxcold there's not a common approach I'm familiar with. Typically when a field is introduced in ECS, the change is made to the data source or integration to start populating that field. New events and indices will have the field, but existing data will not. |
got it, thanks! |
This PR addresses issue #1998 Co-authored-by: Kylie (Geller) Meli <[email protected]>
Summary
Introduce Display Name for an Indicator of Compromise (IoC) in the Threat Intelligence part of ECS
Motivation:
In the Threat Intelligence capabilities of the Security Solution, our team is working on the data grid for IoCs (Indicator of Compromise) where we have an "Indicator" column, which serves as a "Display name" for an indicator. The value of this column currently depends on the indicator type and every type has its own logic. The best example is the File indicator. It can have different hashes, eg. sha256, md5, etc. We take sha256 for display name when available, if not then md5 and so on. For other types there is not much logic involved, we take different values from different threat.indicator* attributes per type. The problem with this approach is that this Display Name is not available as an attribute on Elasticsearch documents coming from Threat Intelligence integrations, therefore users won't be able to filter by it and perform other standard operations they can do for existing ECS attributes. This can be solved partly with runtime fields, but we think adding Display Name to the schema might make sense and want to kick off the discussion about it
Features dependant on having
display_name
field:display_name
display_name
to a TimelineDetailed Design:
Introduce
threat.indicator.display_name
with the following logic perthreat.indicator.type
Data examples can be found in AbuseCH, Anomali, Cybersixgill, MISP, OTX, Recorded Future and ThreatQ integrations
The text was updated successfully, but these errors were encountered: