@@ -101,24 +101,24 @@ An example event for `intel` looks as following:
101101{
102102 "@timestamp" : " 2023-11-21T06:16:01.000Z" ,
103103 "agent" : {
104- "ephemeral_id" : " 6d3e7b87-a3f6-47b1-81a5-0264e901b3f9 " ,
105- "id" : " 36b03887-7783-4bc4-b8c5-6f8997e4cd1a " ,
106- "name" : " docker-fleet- agent" ,
104+ "ephemeral_id" : " 0a4081d5-cebd-4aa5-88f3-4056061d594d " ,
105+ "id" : " 0845386f-5916-4313-8f9d-2690b283c317 " ,
106+ "name" : " elastic- agent-91284 " ,
107107 "type" : " filebeat" ,
108- "version" : " 8.13 .0"
108+ "version" : " 8.18 .0"
109109 },
110110 "data_stream" : {
111111 "dataset" : " ti_crowdstrike.intel" ,
112- "namespace" : " 36922 " ,
112+ "namespace" : " 57429 " ,
113113 "type" : " logs"
114114 },
115115 "ecs" : {
116116 "version" : " 8.11.0"
117117 },
118118 "elastic_agent" : {
119- "id" : " 36b03887-7783-4bc4-b8c5-6f8997e4cd1a " ,
119+ "id" : " 0845386f-5916-4313-8f9d-2690b283c317 " ,
120120 "snapshot" : false ,
121- "version" : " 8.13 .0"
121+ "version" : " 8.18 .0"
122122 },
123123 "event" : {
124124 "agent_id_status" : " verified" ,
@@ -127,9 +127,9 @@ An example event for `intel` looks as following:
127127 ],
128128 "dataset" : " ti_crowdstrike.intel" ,
129129 "id" : " hash_sha256_c98e1a7f563824cd448b47613743dcd1c853742b78f42b000192b83d" ,
130- "ingested" : " 2024-08-01T08:31:15Z " ,
130+ "ingested" : " 2025-05-27T04:25:28Z " ,
131131 "kind" : " enrichment" ,
132- "original": "{\"_marker\":\"17005473618d17ae6353d123235e4158c5c81f25f0\",\"actors\":[\"SALTYSPIDER\"],\"deleted\":false,\"domain_types\":[\"abc.com\"],\"id\":\"hash_sha256_c98e1a7f563824cd448b47613743dcd1c853742b78f42b000192b83d\",\"indicator\":\"c98e192bf71a7f97563824cd448b47613743dcd1c853742b78f42b000192b83d\",\"ip_address_types\":[\"81.2.69.192\"],\"kill_chains\":[\"Installation\",\"C2\"],\"labels\":[{\"created_on\":1700547356,\"last_valid_on\":1700547360,\"name\":\"MaliciousConfidence/High\"},{\"created_on\":1700547359,\"last_valid_on\":1700547359,\"name\":\"Malware/Mofksys\"},{\"created_on\":1700547359,\"last_valid_on\":1700547359,\"name\":\"ThreatType/Commodity\"},{\"created_on\":1700547359,\"last_valid_on\":1700547359,\"name\":\"ThreatType/CredentialHarvesting\"},{\"created_on\":1700547359,\"last_valid_on\":1700547359,\"name\":\"ThreatType/InformationStealer\"}],\"last_updated\":1700547361,\"malicious_confidence\":\"high\",\"malware_families\":[\"Mofksys\"],\"published_date\":1700547356,\"relations\":[{\"created_date\":1700547339,\"id\":\"domain.com.yy\",\"indicator\":\"domain.ds\",\"last_valid_date\":1700547339,\"type\":\"domain\"},{\"created_date\":1700547339,\"id\":\"domain.xx.yy\",\"indicator\":\"domain.xx.fd\",\"last_valid_date\":1700547339,\"type\":\"domain\"}],\"reports\":[\"reports\"],\"targets\":[\"abc\"],\"threat_types\":[\"Commodity\",\"CredentialHarvesting\",\"InformationStealer\"],\"type\":\"hash_sha256\",\"vulnerabilities\":[\"vuln\"]}",
132+ "original": "{\"_marker\":\"17005473618d17ae6353d123235e4158c5c81f25f0\",\"actors\":[\"SALTYSPIDER\"],\"deleted\":false,\"domain_types\":[\"abc.com\"],\"id\":\"hash_sha256_c98e1a7f563824cd448b47613743dcd1c853742b78f42b000192b83d\",\"indicator\":\"c98e192bf71a7f97563824cd448b47613743dcd1c853742b78f42b000192b83d\",\"ip_address_types\":[\"81.2.69.192\"],\"kill_chains\":[\"Installation\",\"C2\"],\"labels\":[{\"created_on\":1700547356,\"last_valid_on\":1700547360,\"name\":\"MaliciousConfidence/High\"},{\"created_on\":1700547359,\"last_valid_on\":1700547359,\"name\":\"Malware/Mofksys\"},{\"created_on\":1700547359,\"last_valid_on\":1700547359,\"name\":\"ThreatType/Commodity\"},{\"created_on\":1700547359,\"last_valid_on\":1700547359,\"name\":\"ThreatType/CredentialHarvesting\"},{\"created_on\":1700547359,\"last_valid_on\":1700547359,\"name\":\"ThreatType/InformationStealer\"}],\"last_updated\":1700547361,\"malicious_confidence\":\"high\",\"malware_families\":[\"Mofksys\"],\"published_date\":1700547356,\"relations\":[{\"created_date\":1700547339,\"id\":\"domain.com.yy\",\"indicator\":\"domain.ds\",\"last_valid_date\":1700547339,\"type\":\"domain\"},{\"created_date\":1700547339,\"id\":\"domain.xx.yy\",\"indicator\":\"domain.xx.fd\",\"last_valid_date\":1700547339,\"type\":\"domain\"}],\"reports\":[\"reports\"],\"targets\":[\"abc\"],\"threat_types\":[\"Commodity\",\"CredentialHarvesting\",\"InformationStealer\"],\"type\":\"hash_sha256\",\"vulnerabilities\":[\"CVE-2020-14882\",\"CVE-2021-41773\"]}",
133133 "type" : [
134134 " indicator"
135135 ]
@@ -247,13 +247,15 @@ An example event for `intel` looks as following:
247247 "type" : " hash_sha256" ,
248248 "value" : " c98e192bf71a7f97563824cd448b47613743dcd1c853742b78f42b000192b83d" ,
249249 "vulnerabilities" : [
250- " vuln"
250+ " CVE-2020-14882" ,
251+ " CVE-2021-41773"
251252 ]
252253 }
253254 },
254255 "vulnerability" : {
255- "category" : [
256- " vuln"
256+ "id" : [
257+ " CVE-2020-14882" ,
258+ " CVE-2021-41773"
257259 ]
258260 }
259261}
0 commit comments