forked from elastic/beats
-
Notifications
You must be signed in to change notification settings - Fork 0
Commit
This commit does not belong to any branch on this repository, and may belong to a fork outside of the repository.
[Filebeat] Add ThreatQuotient to Threat Intel Module elastic#27423
- Loading branch information
1 parent
3c1731d
commit d712003
Showing
11 changed files
with
2,046 additions
and
0 deletions.
There are no files selected for viewing
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
10 changes: 10 additions & 0 deletions
10
...ck/filebeat/module/threatintel/_meta/kibana/7/dashboard/Filebeat-threatintel-threatq.json
Large diffs are not rendered by default.
Oops, something went wrong.
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
41 changes: 41 additions & 0 deletions
41
x-pack/filebeat/module/threatintel/threatq/_meta/fields.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,41 @@ | ||
- name: threatq | ||
type: group | ||
description: > | ||
Fields for ThreatQ Threat Library | ||
fields: | ||
- name: updated_at | ||
type: date | ||
description: > | ||
Last modification time | ||
- name: created_at | ||
type: date | ||
description: > | ||
Object creation time | ||
- name: expires_at | ||
type: date | ||
description: > | ||
Expiration time | ||
- name: expires_calculated_at | ||
type: date | ||
description: > | ||
Expiration calculation time | ||
- name: published_at | ||
type: date | ||
description: > | ||
Object publication time | ||
- name: status | ||
type: keyword | ||
description: > | ||
Object status within the Threat Library | ||
- name: indicator_value | ||
type: keyword | ||
description: > | ||
Original indicator value | ||
- name: adversaries | ||
type: keyword | ||
description: > | ||
Adversaries that are linked to the object | ||
- name: attributes | ||
type: flattened | ||
description: > | ||
These provide additional context about an object |
64 changes: 64 additions & 0 deletions
64
x-pack/filebeat/module/threatintel/threatq/config/config.yml
This file contains bidirectional Unicode text that may be interpreted or compiled differently than what appears below. To review, open the file in an editor that reveals hidden Unicode characters.
Learn more about bidirectional Unicode characters
Original file line number | Diff line number | Diff line change |
---|---|---|
@@ -0,0 +1,64 @@ | ||
{{ if eq .input "httpjson" }} | ||
|
||
type: httpjson | ||
config_version: "2" | ||
interval: {{ .interval }} | ||
|
||
auth.oauth2: | ||
client.id: {{ .client_id }} | ||
client.secret: {{ .client_secret }} | ||
token_url: {{ .token_url }} | ||
request.method: GET | ||
{{ if .ssl }} | ||
- request.ssl: {{ .ssl | tojson }} | ||
{{ end }} | ||
request.url: {{ .host }}api/indicators/query/hash/{{ .data_collection_id }}?sort=%2Bupdated_at&limit=1000 | ||
request.transforms: | ||
- set: | ||
target: url.params.cursorMark | ||
value: '[[.cursor.cursor_mark]]' | ||
default: "*" | ||
cursor: | ||
cursor_mark: | ||
ignore_empty_value: true | ||
value: '[[.last_response.body.nextCursorMark]]' | ||
response.request_body_on_pagination: true | ||
|
||
response.split: | ||
target: body.data | ||
|
||
{{ else if eq .input "file" }} | ||
|
||
type: log | ||
paths: | ||
{{ range $i, $path := .paths }} | ||
- {{$path}} | ||
{{ end }} | ||
exclude_files: [".gz$"] | ||
|
||
{{ end }} | ||
|
||
tags: {{.tags | tojson}} | ||
publisher_pipeline.disable_host: {{ inList .tags "forwarded" }} | ||
|
||
processors: | ||
- decode_json_fields: | ||
fields: [message] | ||
target: json | ||
process_array: true | ||
max_depth: 5 | ||
overwrite_keys: true | ||
add_error_key: true | ||
- fingerprint: | ||
fields: ["json.id"] | ||
target_field: "@metadata._id" | ||
- add_fields: | ||
target: '' | ||
fields: | ||
ecs.version: 1.10.0 | ||
- timestamp: | ||
field: json.created_at | ||
layouts: | ||
- '2006-01-02 15:04:05' | ||
test: | ||
- '2021-06-17 13:55:02' |
Oops, something went wrong.