Skip to content

Commit

Permalink
Merge branch 'master' into 26033-panos-date
Browse files Browse the repository at this point in the history
  • Loading branch information
P1llus authored Jun 24, 2021
2 parents a5858b3 + 4aff295 commit 45b9cb2
Show file tree
Hide file tree
Showing 47 changed files with 6,915 additions and 161 deletions.
4 changes: 4 additions & 0 deletions CHANGELOG.next.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -277,6 +277,7 @@ https://github.com/elastic/beats/compare/v7.0.0-alpha2...master[Check the HEAD d
- Fix bug in aws-s3 input where the end of gzipped log files might have been discarded. {pull}26260[26260]
- Fix bug in `httpjson` that prevented `first_event` getting updated. {pull}26407[26407]
- Fix bug in the Syslog input that misparsed rfc5424 days starting with 0. {pull}26419[26419]
- Do not close filestream harvester if an unexpected error is returned when close.on_state_change.* is enabled. {pull}26411[26411]

*Filebeat*

Expand Down Expand Up @@ -827,6 +828,9 @@ https://github.com/elastic/beats/compare/v7.0.0-alpha2...master[Check the HEAD d
- RFC 5424 and UNIX socket support in the Syslog input are now GA {pull}26293[26293]
- Update grok patterns for HA Proxy module {issue}25827[25827] {pull}25835[25835]
- Update PanOS module's date processor formats to parse `strict_date_optional_time_nanos`. {issue}26033[26033] {pull}26158[26158]
- Update Okta module to parse additional fields to `okta.debug_context.debug_data`. {issue}25689[25689] {pull}25818[25818]
- Added dataset `anomalithreatstream` to the `threatintel` module to ingest indicators from Anomali ThreatStream {pull}26350[26350]
- Add support for `copytruncate` method when rotating input logs with an external tool in `filestream` input. {pull}23457[23457]

*Heartbeat*

Expand Down
10 changes: 10 additions & 0 deletions filebeat/_meta/config/filebeat.inputs.reference.yml.tmpl
Original file line number Diff line number Diff line change
Expand Up @@ -292,6 +292,16 @@ filebeat.inputs:
# original for harvesting but will report the symlink name as source.
#prospector.scanner.symlinks: false

### Log rotation

# When an external tool rotates the input files with copytruncate strategy
# use this section to help the input find the rotated files.
#rotation.external.strategy.copytruncate:
# Regex that matches the rotated files.
# suffix_regex: \.\d$
# If the rotated filename suffix is a datetime, set it here.
# dateformat: -20060102

### State options

# Files for the modification data is older then clean_inactive the state from the registry is removed
Expand Down
312 changes: 312 additions & 0 deletions filebeat/docs/fields.asciidoc
Original file line number Diff line number Diff line change
Expand Up @@ -113109,6 +113109,133 @@ type: keyword

--

[float]
=== suspicious_activity

The suspicious activity fields from the debug data.



*`okta.debug_context.debug_data.suspicious_activity.browser`*::
+
--
The browser used.


type: keyword

--

*`okta.debug_context.debug_data.suspicious_activity.event_city`*::
+
--
The city where the suspicious activity took place.


type: keyword

--

*`okta.debug_context.debug_data.suspicious_activity.event_country`*::
+
--
The country where the suspicious activity took place.


type: keyword

--

*`okta.debug_context.debug_data.suspicious_activity.event_id`*::
+
--
The event ID.


type: keyword

--

*`okta.debug_context.debug_data.suspicious_activity.event_ip`*::
+
--
The IP of the suspicious event.


type: ip

--

*`okta.debug_context.debug_data.suspicious_activity.event_latitude`*::
+
--
The latitude where the suspicious activity took place.


type: float

--

*`okta.debug_context.debug_data.suspicious_activity.event_longitude`*::
+
--
The longitude where the suspicious activity took place.


type: float

--

*`okta.debug_context.debug_data.suspicious_activity.event_state`*::
+
--
The state where the suspicious activity took place.


type: keyword

--

*`okta.debug_context.debug_data.suspicious_activity.event_transaction_id`*::
+
--
The event transaction ID.


type: keyword

--

*`okta.debug_context.debug_data.suspicious_activity.event_type`*::
+
--
The event type.


type: keyword

--

*`okta.debug_context.debug_data.suspicious_activity.os`*::
+
--
The OS of the system from where the suspicious activity occured.


type: keyword

--

*`okta.debug_context.debug_data.suspicious_activity.timestamp`*::
+
--
The timestamp of when the activity occurred.


type: date

--

[float]
=== authentication_context

Expand Down Expand Up @@ -152754,6 +152881,191 @@ type: keyword
The STIX reference object.


type: keyword

--

[float]
=== anomalithreatstream

Fields for Anomali ThreatStream



*`threatintel.anomalithreatstream.classification`*::
+
--
Indicates whether an indicator is private or from a public feed and available publicly. Possible values: private, public.


type: keyword

example: private

--

*`threatintel.anomalithreatstream.confidence`*::
+
--
The measure of the accuracy (from 0 to 100) assigned by ThreatStream's predictive analytics technology to indicators.


type: short

--

*`threatintel.anomalithreatstream.detail2`*::
+
--
Detail text for indicator.


type: text

example: Imported by user 42.

--

*`threatintel.anomalithreatstream.id`*::
+
--
The ID of the indicator.


type: keyword

--

*`threatintel.anomalithreatstream.import_session_id`*::
+
--
ID of the import session that created the indicator on ThreatStream.


type: keyword

--

*`threatintel.anomalithreatstream.itype`*::
+
--
Indicator type. Possible values: "apt_domain", "apt_email", "apt_ip", "apt_url", "bot_ip", "c2_domain", "c2_ip", "c2_url", "i2p_ip", "mal_domain", "mal_email", "mal_ip", "mal_md5", "mal_url", "parked_ip", "phish_email", "phish_ip", "phish_url", "scan_ip", "spam_domain", "ssh_ip", "suspicious_domain", "tor_ip" and "torrent_tracker_url".


type: keyword

--

*`threatintel.anomalithreatstream.maltype`*::
+
--
Information regarding a malware family, a CVE ID, or another attack or threat, associated with the indicator.


type: wildcard

--

*`threatintel.anomalithreatstream.md5`*::
+
--
Hash for the indicator.


type: keyword

--

*`threatintel.anomalithreatstream.resource_uri`*::
+
--
Relative URI for the indicator details.


type: keyword

--

*`threatintel.anomalithreatstream.severity`*::
+
--
Criticality associated with the threat feed that supplied the indicator. Possible values: low, medium, high, very-high.


type: keyword

--

*`threatintel.anomalithreatstream.source`*::
+
--
Source for the indicator.


type: keyword

example: Analyst

--

*`threatintel.anomalithreatstream.source_feed_id`*::
+
--
ID for the integrator source.


type: keyword

--

*`threatintel.anomalithreatstream.state`*::
+
--
State for this indicator.


type: keyword

example: active

--

*`threatintel.anomalithreatstream.trusted_circle_ids`*::
+
--
ID of the trusted circle that imported the indicator.


type: keyword

--

*`threatintel.anomalithreatstream.update_id`*::
+
--
Update ID.


type: keyword

--

*`threatintel.anomalithreatstream.url`*::
+
--
URL for the indicator.


type: keyword

--

*`threatintel.anomalithreatstream.value_type`*::
+
--
Data type of the indicator. Possible values: ip, domain, url, email, md5.


type: keyword

--
Expand Down
Loading

0 comments on commit 45b9cb2

Please sign in to comment.