k8sstormcenter / threatintel

Consume, analyse and create threatintelligence from your honey clusters
Apache License 2.0
5 stars 0 forks source link

Map the redpanda schema (tetragon flattened output) into stix2 or equivalently useful data model #3

Open entlein opened 8 months ago

entlein commented 8 months ago

On the example attack, take the current detections and map them into stix2 and from there load them into the taxii database

entlein commented 5 months ago

@joseftaha : That is what you have been doing already, so we might as well move this issue into active.