-
Notifications
You must be signed in to change notification settings - Fork 4.9k
New issue
Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.
By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.
Already on GitHub? Sign in to your account
[Filebeat] Add Malware Bazaar to Threat Intel Module #24570
Conversation
Pinging @elastic/security-external-integrations (Team:Security-External Integrations) |
💚 Build Succeeded
Expand to view the summary
Build stats
Test stats 🧪
Trends 🧪💚 Flaky test reportTests succeeded. Expand to view the summary
Test stats 🧪
|
Close, not sure of the |
You would need to add the fileset to the timestamp ignore list, That's found here: https://github.com/elastic/beats/blob/master/filebeat/tests/system/test_modules.py#L276 |
x-pack/filebeat/module/threatintel/malwarebazaar/ingest/pipeline.yml
Outdated
Show resolved
Hide resolved
There was a problem hiding this comment.
Choose a reason for hiding this comment
The reason will be displayed to describe this comment to others. Learn more.
Approved for now after the changes from Andrew K is in and the build passes. Any small updates we might want to do would need to be added after FF.
This pull request is now in conflicts. Could you fix it? 🙏
|
* fixed * update * Set content-type to form encoded * update config * dashboard and config work * test data * updated docs * dashboard screenshot * image location * ran mage fmt update * updated changelog * mage fmt * ran the tests * mage fmt after testing * added timestamp fix * fixed related.hash and tlsh * added elf.telfhash * mage'd everything * updated dashboard * Mage update * update snyk build to ignore timestamps * fixing test_modules.py timestamp * Add missing comma to array list item Co-authored-by: Derek Ditch <[email protected]> Co-authored-by: Marius Iversen <[email protected]> Co-authored-by: Adrian Serrano <[email protected]> Co-authored-by: Andrew Kroh <[email protected]> (cherry picked from commit 6a0dc39)
…tel Module (#25177) * [Filebeat] Add Malware Bazaar to Threat Intel Module (#24570) * fixed * update * Set content-type to form encoded * update config * dashboard and config work * test data * updated docs * dashboard screenshot * image location * ran mage fmt update * updated changelog * mage fmt * ran the tests * mage fmt after testing * added timestamp fix * fixed related.hash and tlsh * added elf.telfhash * mage'd everything * updated dashboard * Mage update * update snyk build to ignore timestamps * fixing test_modules.py timestamp * Add missing comma to array list item Co-authored-by: Derek Ditch <[email protected]> Co-authored-by: Marius Iversen <[email protected]> Co-authored-by: Adrian Serrano <[email protected]> Co-authored-by: Andrew Kroh <[email protected]> (cherry picked from commit 6a0dc39) * update reference file * mage fmt update * update docs typo Co-authored-by: Andrew Pease <[email protected]>
…-github-pr-comment-template * upstream/master: Check native environment before starting (elastic#25186) Change event.code and winlog.event_id type (elastic#25176) [Ingest Manager] Proxy processes/elastic-agent to stats (elastic#25193) Update mergify backporting to 7.x and 7.13 (elastic#25196) [Heartbeat]: ensure synthetics version co* [Heartbeat]: ensure synthetics version compatability for suites * address review and fix notice * fix lowercase struct * fix version conflict and rebase * update go.* stuff to master * fix notice.txt * move validate inside sourcempatability for suites (elastic#24777) [Filebeat] Ensure Kibana audit `event.category` and `event.type` are still processed as strings. (elastic#25101) Update replace.asciidoc (elastic#25055) Fix nil panic when overwriting metadata (elastic#24741) [Filebeat] Add Malware Bazaar to Threat Intel Module (elastic#24570) Fix k8s svc selectors mapping (elastic#25169) [Ingest Manager] Make agent retry values for bootstraping configurable (elastic#25163) [Metricbeat] Remove elasticsearc.index.created from the SM code (elastic#25113)
…ng-versions-stack * upstream/master: (28 commits) Add support for parsers in filestream input (elastic#24763) Skip flaky test TestFilestreamTruncate (elastic#25218) backport: Add 7.13 branch (elastic#25189) Update decode_json_fields.asciidoc (elastic#25056) [Elastic Agent] Fix status and inspect command to work inside running container (elastic#25204) Check native environment before starting (elastic#25186) Change event.code and winlog.event_id type (elastic#25176) [Ingest Manager] Proxy processes/elastic-agent to stats (elastic#25193) Update mergify backporting to 7.x and 7.13 (elastic#25196) [Heartbeat]: ensure synthetics version co* [Heartbeat]: ensure synthetics version compatability for suites * address review and fix notice * fix lowercase struct * fix version conflict and rebase * update go.* stuff to master * fix notice.txt * move validate inside sourcempatability for suites (elastic#24777) [Filebeat] Ensure Kibana audit `event.category` and `event.type` are still processed as strings. (elastic#25101) Update replace.asciidoc (elastic#25055) Fix nil panic when overwriting metadata (elastic#24741) [Filebeat] Add Malware Bazaar to Threat Intel Module (elastic#24570) Fix k8s svc selectors mapping (elastic#25169) [Ingest Manager] Make agent retry values for bootstraping configurable (elastic#25163) [Metricbeat] Remove elasticsearc.index.created from the SM code (elastic#25113) [Ingest Manager] Keep http and logging config during enroll (elastic#25132) Refactor kubernetes autodiscover to avoid skipping short-living pods (elastic#24742) [libbeat] New decode xml wineventlog processor (elastic#25115) ...
Closes https://github.com/elastic/elastic-security-labs/issues/61
What does this PR do?
This PR adds the Malware Bazaar threat feed to the threat intel module of Filebeat.
Why is it important?
Malware Bazaar provides rich file metadata about malware that can assist cyber intelligence analysts, threat hunters, and incident responders during incident response and ongoing security operations.
Currently, the threat intel module for Filebeat did not have the data provided by Malware Bazaar.
Checklist
CHANGELOG.next.asciidoc
orCHANGELOG-developer.next.asciidoc
.Author's Checklist
./filebeat setup
imports the saved search, visualization, and dashboardHow to test this PR locally
This can be tested by:
Go to KIbana -> dashboards -> apply the
threat intel
tagRelated issues
Resolves #24569
Use cases
Threat hunting, security operations, and intelligence analysis.
Screenshots
Logs
Original data from source
Data from module