Skip to content
New issue

Have a question about this project? Sign up for a free GitHub account to open an issue and contact its maintainers and the community.

By clicking “Sign up for GitHub”, you agree to our terms of service and privacy statement. We’ll occasionally send you account related emails.

Already on GitHub? Sign in to your account

Add IOC expiration support to all TI providers #5369

Closed
10 tasks done
narph opened this issue Feb 23, 2023 · 8 comments
Closed
10 tasks done

Add IOC expiration support to all TI providers #5369

narph opened this issue Feb 23, 2023 · 8 comments
Assignees
Labels
Integration:ti_util Threat Intelligence Utilities Team:Security-Service Integrations Security Service Integrations Team [elastic/security-service-integrations]

Comments

@narph
Copy link
Contributor

narph commented Feb 23, 2023

Meta issue https://github.com/elastic/security-team/issues/5868 for detailed info.

Once support for IOC expiration has been implemented in https://github.com/elastic/security-team/issues/6114 then this should be applied (if necessary) in all the ti_* packages. The following list of packages are in priority order:

@elasticmachine
Copy link

Pinging @elastic/security-external-integrations (Team:Security-External Integrations)

@jamiehynds jamiehynds added the Integration:ti_util Threat Intelligence Utilities label Feb 24, 2023
@narph
Copy link
Contributor Author

narph commented Mar 6, 2023

@P1llus , @andrewkroh can we get a confirmation here on the list?
@P1llus mentioned we are targeting anomali and recordedfuture packages.
Is the list correct? Any direction/timeline on the other ti_packages?

@P1llus
Copy link
Member

P1llus commented Mar 6, 2023

Not all of these packages are applicable, and the "solution" is different for each TI package, for example Recorded Future does not have any expiry dates, and the issue there is much different than with Anomali.

While maybe one or two more of the TI packages might be applicable, the focus should really be on the ones that customers have been asking for (Anomali and RF), and we should take a look at some of the others individually once the first 2 are done.

@LaZyDK
Copy link
Contributor

LaZyDK commented Mar 6, 2023

And MISP.

@P1llus
Copy link
Member

P1llus commented Mar 6, 2023

And MISP.

The issue with MISP is going to be the fact that every source would be different, there is no specific format we can follow

@kcreddy
Copy link
Contributor

kcreddy commented Apr 24, 2023

PR for RecordedFuture #5460
PR for Anomali #5582

@kcreddy
Copy link
Contributor

kcreddy commented Jul 25, 2023

ti_abusech: I couldn't find documentation about indicator expiration in AbuseCH docs. Since they didn't have any communication channel, I filled up the form requesting information on the same: https://www.spamhaus.com/contact-us-abuse-ch/

ti_otx: The API thats currently being used is no longer supported as per API documentation: https://otx.alienvault.com/assets/static/external_api.html#Home. Created an issue: AlienVault-OTX/OTX-Python-SDK#70 to get more info. Also found that their python SDK is using /pulses/subscribed API to get indicators that users are subscribed to: https://github.com/KarmaIncarnate/OTX_Siphon/blob/master/OTX_Siphon.py#L138`

@chrisberkhout
Copy link
Contributor

@kcreddy I've got most a solution for OpenCTI done. I just have some field type issues and dashboard filtering to adjust and then I'll open a PR.

Sign up for free to join this conversation on GitHub. Already have an account? Sign in to comment
Labels
Integration:ti_util Threat Intelligence Utilities Team:Security-Service Integrations Security Service Integrations Team [elastic/security-service-integrations]
Projects
None yet
Development

No branches or pull requests

8 participants