diff --git a/rfcs/text/0008-threat-intel.md b/rfcs/text/0008-threat-intel.md new file mode 100644 index 0000000000..1e12232415 --- /dev/null +++ b/rfcs/text/0008-threat-intel.md @@ -0,0 +1,119 @@ +# 0008: Cyber Threat Intelligence Fields + + +- Stage: **0 (strawperson)** +- Date: **2020-10-15** + +Elastic Security Solution will be adding the capability to ingest, process and utilize threat intelligence information for increasing detection coverage and helping analysts making quicker investigation decisions. Threat intelligence can be collected from a number of sources with a variety of structured and semi-structured data representations. This makes threat intelligence an ideal candidate for ECS mappings. Threat intelligence data will require ECS mappings to normalize it and make it usable in our security solution. This RFC is focused on identifying new field sets and values that need to be created for threat intelligence data. Existing ECS field reuse will be prioritized where possible. If new fields are required we will utilize [STIX Cyber Observable data model](https://docs.oasis-open.org/cti/stix/v2.1/cs01/stix-v2.1-cs01.html#_mlbmudhl16lr) as guidance. + + + + + +## Fields + + + + + + + +## Usage + + + +## Source data + + + + + + + +## Scope of impact + + + +## Concerns + + + + + + + + + +## Real-world implementations + + + +## People + +The following are the people that consulted on the contents of this RFC. + +@Shimon | author + + + + +## References + +[Threat Intel Field Set Draft](https://docs.google.com/spreadsheets/d/1hS3tF-sGmwnKb7uUGLo3Rng_q6EFgwo6UCae8Sp4E-g/edit?usp=sharing) + + +### RFC Pull Requests + + + +* Stage 0: https://github.com/elastic/ecs/pull/986 + +