-
Notifications
You must be signed in to change notification settings - Fork 426
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[RFC] Support id in threat.indicator for STIX 2.1 #2252
Comments
Hello @brett-fitz ! Thanks for creating the issue and wanting to expand on the threat.* ECS schema. From what I can see, there is nothing against having an ID field, which would could include an array of relevant ID's, but there are a few things we might want to clear up first:
|
Hello @P1llus! 1,4. Yup, any ID value, STIX or custom, is fine. An array here would make sense as well to allow for identification of the same observable across systems that use different ID formats. |
@P1llus Hey! Curious what the next steps are in the RFC process? Let me know if you need me to submit a PR. 😄 |
@ebeahan what is the current process here? |
@brett-fitz Yeah I think a PR is the next step. We'll find the right folks to weigh-in on the PR and to confirm the proposed addition fits into how we've been using the |
Added threat.indicator.id field. Resolves #2252. The new field threat.indicator.id will allow for security systems to append a threat.indicator.id. This field can have multiple values to allow for the identification of the same indicator across systems that use different ID formats.
Summary
This STIX 2.1 domain object: indicator, is currently represented in the threat.indicator namespace.
Requesting support for field
id
in thethreat
field set under theindicator
namespace:threat.indicator.id
.This field is a required STIX 2.1 property for indicators.
Motivation:
When storing STIX 2.1 indicators in elasticsearch using ECS schema, the properties
id
,spec_version
,type
,created
, andmodified
must be stored. Currently, the threat field set only maps the following (to my understanding).type
-->threat.indicator.type
spec_version
-->threat.indicator.marking.tlp_version
(loose)created
-->event.created
==threat.indicator.first_seen
modified
-->threat.indicator.modified_at
Detailed Design:
Provide additional details around the design of the proposed changes.
Field names
threat.indicator.id
ORevent.id
--> Caveat: This doesn't work nicely when multiple indicators are in the same event.Example values for the fields
domain-name--ecb120bf-2694-4902-a737-62b74539a41b
ipv4-address--efcd5e80-570d-4131-b213-62cb18eaa6a8
Suggested appropriate datatypes
Array[keyword]
Any example events that map to the proposed use case(s)
The text was updated successfully, but these errors were encountered: