Threat Intelligence Indicators
Threat intelligence, often abbreviated as threat intel, is information that helps you prevent or mitigate cyber attacks. Threat intelligence indicators are individual data points about threats that are gathered from external sources about various entities such as host names, file hashes, IP addresses, and other known targets for compromise. You can import files containing threat intelligence indicators directly into Sumo Logic to aid in security analysis.
Threat intelligence indicators can help security analysts leverage a large body of information to surface potential threats. For example, say that a threat intelligence database has an indicator that correlates a certain IP address with known malicious activity. Because of this correlation, analysts can assume log messages with that IP address are more likely to be part of a real cyber attack.
Once you ingest indicators and they appear on the Threat Intelligence tab, you can use them to search logs for threats. See Find threats with log queries to learn how.
Prerequisitesβ
Role capabilitiesβ
To view and manage threat intelligence indicators on the Threat Intelligence tab, you must have the correct role capabilities.
- In the left navigation bar of Sumo Logic, select Administration > Users and Roles.
- Click the Roles tab.
- Click Add Role to create a new role. Alternatively, you can select an existing role in the Roles tab and click Edit.
Add the following capabilities:
- Threat Intel
- View Threat Intel Data Store
- Manage Threat Intel Data Store
- Threat Intel
You do not need to be assigned these role capabilities to find threats with log queries.
Ingest threat intelligence indicatorsβ
To search logs that contain correlations to threat intelligence indicators, you must first ingest the indicators. You can ingest indicators using:
- The Threat Intelligence tab. See Add indicators in the Threat Intelligence tab.
- A collector. See STIX/TAXII 2 Client Source and STIX/TAXII 1 Client Source.
- The API. See the following APIs in the Threat Intel Ingest Management API resource:
See Upload formats for the format to use when uploading indicators using the Threat Intelligence tab or APIs.
- The limit of the number of indicators that can be uploaded in one API call is 100.
- When you add indicators, the event is recorded in the Audit Event Index. See Audit logging for threat intelligence.
Typical workflowβ
Here is the typical workflow to set up and use threat intelligence indicators:
- A system administrator sets up services to automatically ingest threat intelligence indicators. For example, install a collector such as the STIX/TAXII 2 Client Source, and set up services to obtain indicators from Federal, vendor, and open services. Then ingest them using the Threat Intel Ingest Management APIs. You can manually add more indicators as needed, such as your own private indicators, using the Threat Intelligence tab or the APIs.
- Analysts use the threat indicators data for such things as saved searches, dashboards, manual searches, Cloud SIEM rules, and Cloud SIEM UI.
- A system administrator occasionally checks to see why a connector isnβt ingesting data, or to see how much storage all the indicators are using. They may delete some old or irrelevant data.
Threat Intelligence tabβ
Use the Threat Intelligence tab to add and manage threat intelligence indicators. You can add threat intelligence indicators from a number of sources, including CrowdStrike, TAXII, ThreatQ, iDefense, and many others. And threat intelligence indicators imported to Sumo Logic not only integrate with your existing core Sumo Logic deployment, but also Cloud SIEM and Cloud SOAR.
To access the Threat Intelligence tab, go to Manage Data > Logs > Threat Intelligence.
- Add Indicators. Click to upload files that add threat intelligence indicators.
- Actions. Select to perform additional actions:
- Edit Retention Period. Enter the length of time in days to retain expired threat intelligence indicator files. The maximum number of days is 180. See Change the retention period for expired indicators.
- Source Name. The source of the threat intelligence indicator file.
- Storage Consumed. The amount of storage consumed by the threat intelligence indicator file.
- Indicators. The number of threat intelligence indicators included in the file.
- The "CrowdStrike provided by Sumo Logic (s_CrowdStrike)" source is a default source and cannot be changed or deleted. When performing searches against this source, use "s_CrowdStrike" as the source name.
- The default storage limit is 5 million total indicators (not including any indicators provided by Sumo Logic such as the s_CrowdStrike source).
Add indicators in the Threat Intelligence tabβ
To add threat intelligence indicators in the Threat Intelligence tab, you must upload files containing the indicators in a format that can be consumed by Sumo Logic.
You can also add threat intelligence indicators using the API or a collector. See Ingest threat intelligence indicators.
-
In Sumo Logic, go to Manage Data > Logs > Threat Intelligence.
-
Click Add Indicators. The dialog displays.
-
Select the format of the file to be uploaded:
- Normalized JSON. A normalized JSON file.
- CSV. A comma-separated value (CSV) file.
- STIX 2.x JSON. A JSON file in STIX 2.x format. When choosing this format, you must enter the name of the source in the Source field provided.
See Upload formats for the format to use in the file.
-
Click Upload to upload the file.
-
Click Import.
When you add indicators, the event is recorded in the Audit Event Index. See Audit logging for threat intelligence.
Delete threat intelligence indicatorsβ
- In Sumo Logic, go to Manage Data > Logs > Threat Intelligence.
- Select a source in the list of sources. Details of the source appear in a sidebar.
- Click Delete Indicators. The following dialog appears.
- Select indicators to delete from the source:
- Delete all indicators. Remove all indicators from the source.
- Delete indicators matching the expression. Enter the attribute and value to match. For example, if you want to delete indicators with certain "valid until" dates from Sumo normalized JSON files, for an attribute enter
validUntil
and for a value enter a date. The attributes and values you enter must match attributes and values in the indicators.
- Click Delete.
When you remove indicators, the event is recorded in the Audit Event Index. See Audit logging for threat intelligence.
Change the retention period for expired indicatorsβ
Indicators are deemed valid until they reach the date set by their "valid until" attribute (validUntil
for normalized JSON and CSV, and valid_until
for STIX). After that date, they are considered expired.
Expired indicators are retained until they reach the end of the retention period. At the end of the retention period, expired indicators are automatically deleted. Between the time they expire and are deleted, the indicators are still in the system, and you can search against them if you want.
By default, expired indicators are retained for 180 days. To change the retention period:
- In Sumo Logic, go to Manage Data > Logs > Threat Intelligence.
- Click the three-dot button in the upper-right corner of the page.
- Click Edit Retention Period.
- Enter the length of time in days to retain expired threat intelligence indicator files. The maximum number of days is 180.
When you change the retention period, the event is recorded in the Audit Event Index. See Audit logging for threat intelligence.
You do not have to wait until indicators reach the end of their retention period in order to delete them. You can use the Threat Intelligence tab to delete indicators, as well as use the APIs in the Threat Intel Ingest Management API resource.
Find threats with log queriesβ
Once you ingest threat intelligence indicators, you can perform searches to find matches to data in the indicators using the threatlookup
search operator.
The threatlookup
operator allows you to search logs for matches in threat intelligence indicators. For example, use the following query to find logs in all sec_record*
indexes with a srcDevice_ip
attribute correlated to a threat indicator with a high confidence level (greater than 50):
_index=sec_record*
| threatlookup srcDevice_ip
| where _threatlookup.confidence > 50
| timeslice 1h
| count by _timeslice
Syntaxβ
threatlookup [singleIndicator] [source="<source_value>"] [include="<all|active|expired>"] <indicator_value_field> [,<optional_indicator_value_field_2>, β¦]
Where:
-
singleIndicator
returns the single best matching indicator. (In the response,num_match
indicates how many actual matches there are.) IfsingleIndicator
is not specified, all matching indicators are returned.Specifying
singleIndicator
sorts the list of matching indicators using the following priority order, then returns the indicator at the top of the list:- Active indicators over expired indicators (if you use
include="all"
). - Higher confidence indicators.
- More malicious indicators.
- Most recently updated indicators.
If there's still a tie at this point, the system picks the indicator the back-end database returned first.
- Active indicators over expired indicators (if you use
-
source
is the source to search for the threat intelligence indicator. Ifsource
is not specified, all sources are searched. -
include
includes either all, only active, or only expired threat intelligence indicators. Ifinclude
is not specified, all matching indicators are returned. -
<indicator_value_field>
is the indicator to look up. -
<optional_indicator_value_field>
is used to add more indicators to look up.
Response fieldsβ
- confidence
- fields
- imported
- indicator
- valid_from
- valid_until
- source
- threat_type
- type
- updated
- num_match (if
singleIndicator
is used)
Examplesβ
_index=sec_record*
| threatlookup srcDevice_ip
| where _threatlookup.confidence > 50
| timeslice 1h
| count by _timeslice
_index=sec_record*
| threatlookup singleIndicator srcDevice_ip
| where _threatlookup.confidence > 50
| timeslice 1h
| count by _timeslice
_index=sec_record*
| threatlookup source="s_CrowdStrike" srcDevice_ip
| where _threatlookup.confidence > 50
| timeslice 1h
| count by _timeslice
_index=sec_record*
| threatlookup dstDevice_ip, srcDevice_ip
| where _threatlookup.confidence > 50
| timeslice 1h
| count by _timeslice
_index=sec_record*
| threatlookup source="s_CrowdStrike" dstDevice_ip, srcDevice_ip
| where _threatlookup.confidence > 50
| timeslice 1h
| count by _timeslice
_index=sec_record*
| threatlookup source="s_CrowdStrike" include="active" dstDevice_ip, srcDevice_ip
| where _threatlookup.confidence > 50
| timeslice 1h
| count by _timeslice
Threat indicators in Cloud SIEMβ
Threat indicators can be used in Cloud SIEM to find possible threats.
hasThreatMatch Cloud SIEM rules language functionβ
Use the hasThreatMatch
function in Cloud SIEM rules to search incoming Records for matches to threat intelligence indicators.
For example, use the function to find all Records with a srcDevice_ip
attribute correlated to a threat indicator with a high confidence level (greater than 50):
hasThreatMatch([srcDevice_ip], confidence > 50)
The hasThreatMatch
Cloud SIEM rules function searches incoming Records in Cloud SIEM for matches to threat intelligence indicators. It can also match values in Cloud SIEM threat intelligence.
Syntax
hasThreatMatch([<fields>], <filters>, <indicators>)
Parameters:
<fields>
is a list of comma separated Entity field names. At least one field name is required.<filters>
is a logical expression using indicator attributes. (Allowed are parentheses()
;OR
andAND
boolean operators; and comparison operators=
,<
,>
,=<
,=>
,!=
.)<indicators>
is an optional case insensitive option that describes how indicators should be matched with regard to their validity. Accepted values are:active_indicators
. Match active indicators only (default).expired_indicators
. Match expired indicators only.all_indicators
. Match all indicators.
Examples
hasThreatMatch([srcDevice_ip])
hasThreatMatch([srcDevice_ip, dstDevice_ip])
hasThreatMatch([srcDevice_ip], confidence > 50)
hasThreatMatch([srcDevice_ip], confidence > 50 AND source="FreeTAXII")
hasThreatMatch([srcDevice_ip], source="s1" OR (source="s2" confidence > 50 AND))
hasThreatMatch([srcDevice_ip], expired_indicators)
hasThreatMatch([srcDevice_ip], confidence > 50, all_indicators)
View threat indicators in the Cloud SIEM UIβ
An Entity can be associated with a known indicator that has a threat type attribute, either threatType
(in normalized JSON format and CSV format), or indicator_types
(in STIX format as defined by indicator_types in STIX 2.1).
When that occurs, then anywhere the Entity is displayed in the Cloud SIEM UI, a threat indicator icon or label will be displayed showing the Entity's "reputation" corresponding to that threat type:
Threat type value | Label in the Cloud SIEM UI |
---|---|
anomalous-activity | Suspicious |
anonymization | Suspicious |
benign | Not Flagged |
compromised | Malicious |
malicious-activity | Malicious |
attribution | (None) |
unknown (or not set) | Suspicious |
Note that if the mapping produces a threat indicator level of Malicious, but the confidence is less than 60, the Entity's reputation will be set to Suspicious instead. If there are multiple reputation values for a given Entity (potentially from threat intel and enrichment), Cloud SIEM will show the most severe indicator.
Since different sources can report different reputations, each source has a reputation icon on its row in the Cloud SIEM UI. In the following example, the indicator from the Unit 42 source returned a reputation of Malicious, hence the red icon. The link to the right would open a log search window showing the matching indicators in detail.
Audit logging for threat intelligenceβ
Use the Audit Event Index to view events for threat indicators, such as adding indicators, removing indicators, or changing the retention period.
Use a search like the following:
_index=sumologic_audit_events _sourceCategory=threatIntelligence
Upload formatsβ
Use the following formats for threat intelligence indicator files when you add indicators in the Threat Intelligence tab or when you use the upload APIs in the Threat Intel Ingest Management API resource:
Normalized JSON formatβ
Normalized JSON format is a standardized method to present JSON data. You can use this format to load indicators from multiple sources.
Example fileβ
Following is an example threat indicator file in normalized JSON format. (For another example, see the uploadNormalizedIndicators API).
{
"indicators": [
{
"id": "0001",
"indicator": "192.0.2.0",
"type": "ipv4-addr:value",
"source": "FreeTAXII",
"validFrom": "2023-03-21T12:00:00.000Z",
"validUntil": "2025-03-21T12:00:00.000Z",
"confidence": 30,
"threatType": "malicious-activity",
"actors": "actor1,actor2",
"killChain": "reconnaissance",
"fields": {
"kill_chain_name": "lockheed-martin-cyber-kill-chain",
"kill_chain_phase": "reconnaissance"
}
},
{
"id": "0002",
"indicator": "192.0.2.1",
"type": "ipv4-addr:value",
"source": "FreeTAXII",
"validFrom": "2023-03-21T12:00:00.000Z",
"validUntil": "2025-03-21T12:00:00.000Z",
"confidence": 30,
"threatType": "malicious-activity",
"actors": "actor3,actor4",
"killChain": "reconnaissance",
"fields": {
"kill_chain_name": "lockheed-martin-cyber-kill-chain",
"kill_chain_phase": "reconnaissance"
}
}
]
}
Required attributesβ
For information about the attributes to use, see "Indicator" in the STIX 2.1 specification, and the uploadNormalizedIndicators API in the Threat Intel Ingest Management API resource.
The following attributes are required:
- id (string). ID of the indicator. For example,
indicator--d81f86b9-975b-4c0b-875e-810c5ad45a4f
. - indicator (string). Value of the indicator, such as an IP address, file name, email address, etc. For example,
192.0.2.0
. - type (string). Type of the indicator. Following are valid values:
domain-name
. Domain name. (Entity type in Cloud SIEM is_domain
.)email-addr
. Email address. (Entity type in Cloud SIEM is_email
.)file
. File name. (Entity type in Cloud SIEM is_file
.)ipv4-addr
. IPv4 IP address. (Entity type in Cloud SIEM is_ip
.)ipv6-addr
. IPv6 IP address. (Entity type in Cloud SIEM is_ip
.)mac-addr
. Mac address name. (Entity type in Cloud SIEM is_mac
.)process
. Process name. (Entity type in Cloud SIEM is_process
.)url
. URL. (Entity type in Cloud SIEM is_url
.)user-account
. User ID. (Entity type in Cloud SIEM is_username
.)
- source (string). User-provided text to identify the source of the indicator. For example,
FreeTAXII
. - validFrom (string [date-time]). Beginning time this indicator is valid. Timestamp in UTC in RFC3339 format. For example,
2023-03-21T12:00:00.000Z
. - confidence (integer [ 1 .. 100 ]). Confidence that the creator has in the correctness of their data, where 100 is highest (as defined by the confidence scale in STIX 2.1). For example,
75
. - threatType (string). Type of indicator (as defined by indicator_types in STIX 2.1). For example,
malicious-activity
. (This attribute can result in a special label appearing next to Entities in the Cloud SIEM UI. See Threat indicators in the Cloud SIEM UI.)
Following are valid values:anomalous-activity
. Unexpected or unusual activity that may not necessarily be malicious or indicate compromise.anonymization
. Suspected anonymization tools or infrastructure (proxy, TOR, VPN, etc.).benign
. Activity that is not suspicious or malicious in and of itself, but when combined with other activity may indicate suspicious or malicious behavior.compromised
. Assets that are suspected to be compromised.malicious-activity
. Patterns of suspected malicious objects and/or activity.attribution
. Patterns of behavior that indicate attribution to a particular threat actor or campaign.unknown
(or not set). There is not enough information available to determine the threat type.
The following attributes are optional:
- actors (string list). An identified threat actor such as an individual, organization, or group. For example,
actor1
. This attribute is frequently used in the s_CrowdStrike source. - killChain (string list). The various phases an attacker may undertake to achieve their objectives (as defined by kill_chain_phase in STIX 2.1). For example,
reconnaissance
. This attribute is frequently used in the s_CrowdStrike source. Although you can use any kill chain definition and values you want, following are example values based on the standard stages in a kill chain:reconnaissance
. Researching potential targets.weaponization
. Creation of malware to be used against an identified target.delivery
. Infiltration of a targetβs network and users.exploitation
. Taking advantage of the vulnerabilities discovered in previous stages to further infiltrate a targetβs network and achieve objectives.installation
. Install malware and other cyberweapons onto the target network to take control of its systems and exfiltrate valuable data.command-and-control
. Communication with the installed malware.actions-on-objectives
. Carrying out cyberattack objectives.
CSV formatβ
Comma-separated value (CSV) is a standard format for data upload.
Example filesβ
Upload with the UIβ
If uploading a CSV file with the UI, the format should be the same as used for a standard CSV file:
0001,192.0.2.0,ipv4-addr:value,FreeTAXII,2023-02-21T12:00:00.00Z,2025-05-21T12:00:00.00Z,30,malicious-activity,,
0002,192.0.2.1,ipv4-addr:value,FreeTAXII,2023-02-21T12:00:00.00Z,2025-05-21T12:00:00.00Z,30,malicious-activity,actor3,reconnaissance
Upload with the APIβ
If uploading a CSV file using the API, the file should be contained in a JSON object like this:
{
"csv": "0001,192.0.2.0,ipv4-addr,FreeTAXII,2023-02-21T12:00:00.00Z,2025-05-21T12:00:00.00Z,3,malicious-activity,,\n
0002,192.0.2.1,ipv4-addr,FreeTAXII,2023-02-21T12:00:00.00Z,2025-05-21T12:00:00.00Z,3,malicious-activity,actor3,reconnaissance\n"
}
For other examples for uploading CSV files using the API, see the uploadCsvIndicators API and the uploadBlobIndicators API.
Required attributesβ
For information about the attributes to use, see "Indicator" in the STIX 2.1 specification, and the uploadCsvIndicators API in the Threat Intel Ingest Management API resource.
Columns for the following attributes are required in the upload file:
- id (string). ID of the indicator. For example,
indicator--d81f86b9-975b-4c0b-875e-810c5ad45a4f
. - indicator (string). Value of the indicator, such as an IP address, file name, email address, etc. For example,
192.0.2.0
. - type (string). Type of the indicator. Following are valid values:
domain-name
. Domain name. (Entity type in Cloud SIEM is_domain
.)email-addr
. Email address. (Entity type in Cloud SIEM is_email
.)file
. File name. (Entity type in Cloud SIEM is_file
.)ipv4-addr
. IPv4 IP address. (Entity type in Cloud SIEM is_ip
.)ipv6-addr
. IPv6 IP address. (Entity type in Cloud SIEM is_ip
.)mac-addr
. Mac address name. (Entity type in Cloud SIEM is_mac
.)process
. Process name. (Entity type in Cloud SIEM is_process
.)url
. URL. (Entity type in Cloud SIEM is_url
.)user-account
. User ID. (Entity type in Cloud SIEM is_username
.)
- source (string). User-provided text to identify the source of the indicator. For example,
FreeTAXII
. - validFrom (string [date-time]). Beginning time this indicator is valid. Timestamp in UTC in RFC3339 format. For example,
2023-03-21T12:00:00.000Z
. - validUntil (string [date-time]). Ending time this indicator is valid. If not set, the indicator never expires. Timestamp in UTC in RFC3339 format. For example,
2024-03-21T12:00:00.000Z
. - confidence (integer [ 1 .. 100 ]). Confidence that the creator has in the correctness of their data, where 100 is highest. For example,
75
. - threatType (string). Type of indicator (as defined by indicator_types in STIX 2.1). For example,
malicious-activity
. (This attribute can result in a special label appearing next to Entities in the Cloud SIEM UI. See Threat indicators in the Cloud SIEM UI.)
Following are valid values:anomalous-activity
. Unexpected or unusual activity that may not necessarily be malicious or indicate compromise.anonymization
. Suspected anonymization tools or infrastructure (proxy, TOR, VPN, etc.).benign
. Activity that is not suspicious or malicious in and of itself, but when combined with other activity may indicate suspicious or malicious behavior.compromised
. Assets that are suspected to be compromised.malicious-activity
. Patterns of suspected malicious objects and/or activity.attribution
. Patterns of behavior that indicate attribution to a particular threat actor or campaign.unknown
(or not set). There is not enough information available to determine the threat type.
The following attributes are optional:
- actors (string list). An identified threat actor such as an individual, organization, or group. For example,
actor3
. This attribute is frequently used in the s_CrowdStrike source. Note if you donβt provide a value foractors
, you still must provide the empty column at the end of the row with an extra comma, as shown in the examples above. - killChain (string list). The various phases an attacker may undertake to achieve their objectives (as defined by kill_chain_phase in STIX 2.1). For example,
reconnaissance
. This attribute is frequently used in the s_CrowdStrike source. Although you can use any kill chain definition and values you want, following are example values based on the standard stages in a kill chain:reconnaissance
. Researching potential targets.weaponization
. Creation of malware to be used against an identified target.delivery
. Infiltration of a targetβs network and users.exploitation
. Taking advantage of the vulnerabilities discovered in previous stages to further infiltrate a targetβs network and achieve objectives.installation
. Install malware and other cyberweapons onto the target network to take control of its systems and exfiltrate valuable data.command-and-control
. Communication with the installed malware.actions-on-objectives
. Carrying out cyberattack objectives.
STIX 2.x JSON formatβ
STIX 2.x JSON format is a method to present JSON data according to the STIX 2.x specification.
Note that if you want to upload indicators from multiple sources, you cannot use this format but instead should use the Normalized JSON format.
Also note that if your STIX file includes lines like these at the top...
{
"type": "bundle",
"id": "bundle--cf20f99b-3ed2-4a9f-b4f1-d660a7fc8241",
"objects": [
{
"type": "indicator",
...you should remove them before uploading the file, and leave only the objects array like this:
[
{
"type": "indicator",
Example filesβ
Upload with the UIβ
Following is an example threat indicator file in STIX 2.1 JSON format if you're uploading a file with the UI.
If you are uploading via the UI, do not include the source
value in the file, since the UI prompts for the source value when you add the indicator.
[
{
"type": "indicator",
"spec_version": "2.1",
"id": "0001",
"created": "2023-03-21T12:00:00.000Z",
"modified": "2023-03-21T12:00:00.000Z",
"confidence": 30,
"pattern": "[ipv4-addr:value = '192.0.2.0']",
"pattern_type": "stix",
"pattern_version": "string",
"valid_from": "2023-03-21T12:00:00.000Z",
"valid_until": "2025-03-21T12:00:00.000Z",
"indicator_types": [
"malicious-activity"
],
"kill_chain_phases": [
{
"kill_chain_name": "lockheed-martin-cyber-kill-chain",
"phase_name": "reconnaissance"
}
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "0002",
"created": "2023-03-21T12:00:00.000Z",
"modified": "2023-03-21T12:00:00.000Z",
"confidence": 30,
"pattern": "[ipv4-addr:value = '192.0.2.1']",
"pattern_type": "stix",
"pattern_version": "string",
"valid_from": "2023-03-21T12:00:00.000Z",
"valid_until": "2025-03-21T12:00:00.000Z",
"indicator_types": [
"malicious-activity"
],
"kill_chain_phases": [
{
"kill_chain_name": "lockheed-martin-cyber-kill-chain",
"phase_name": "reconnaissance"
}
]
}
]
Upload with the APIβ
Following is an example threat indicator file in STIX 2.1 JSON format if you're uploading a file with the API.
As shown in the following example, if uploading via the API you must add the source
attribute outside of the indicators object, since the source is not part of the STIX standard. You must also include an indicators
array field. (For another example for uploading via the API, see the uploadStixIndicators API).
{
"source": "FreeTAXII",
"indicators": [
{
"type": "indicator",
"spec_version": "2.1",
"id": "0001",
"created": "2023-03-21T12:00:00.000Z",
"modified": "2023-03-21T12:00:00.000Z",
"confidence": 30,
"pattern": "[ipv4-addr:value = '192.0.2.0']",
"pattern_type": "stix",
"pattern_version": "string",
"valid_from": "2023-03-21T12:00:00.000Z",
"valid_until": "2025-03-21T12:00:00.000Z",
"indicator_types": [
"malicious-activity"
],
"kill_chain_phases": [
{
"kill_chain_name": "lockheed-martin-cyber-kill-chain",
"phase_name": "reconnaissance"
}
]
},
{
"type": "indicator",
"spec_version": "2.1",
"id": "0002",
"created": "2023-03-21T12:00:00.000Z",
"modified": "2023-03-21T12:00:00.000Z",
"confidence": 30,
"pattern": "[ipv4-addr:value = '192.0.2.1']",
"pattern_type": "stix",
"pattern_version": "string",
"valid_from": "2023-03-21T12:00:00.000Z",
"valid_until": "2025-03-21T12:00:00.000Z",
"indicator_types": [
"malicious-activity"
],
"kill_chain_phases": [
{
"kill_chain_name": "lockheed-martin-cyber-kill-chain",
"phase_name": "reconnaissance"
}
]
}
]
}
Required attributesβ
For information about the attributes to use, see "Indicator" in the STIX 2.1 specification, and the uploadStixIndicators API in the Threat Intel Ingest Management API resource.
The following attributes are required:
- type (string). The type of STIX object. For example,
indicator
. The value must be the name of one of the types of STIX objects defined in the STIX 2.x specification. - spec_version (string). The version of the STIX specification used to represent this object. The value of this property must be
2.1
for STIX objects defined according to the STIX 2.1 specification. - id (string). ID of the indicator. For example,
indicator--d81f86b9-975b-4c0b-875e-810c5ad45a4f
. - created (string [date-time]). The time at which the object was originally created. Timestamp in UTC in RFC3339 format. For example,
2016-05-01T06:13:14.000Z
. - modified (string [date-time]). When the object is modified. Timestamp in UTC in RFC3339 format. For example,
2023-05-01T06:13:14.000Z
. This property is only used by STIX Objects that support versioning and represents the time that this particular version of the object was last modified. - pattern (string). The pattern of this indicator (as defined by pattern in STIX 2.1).
For example,[ file:hashes.'SHA-256' = '4bac393bdd' ]
. Following are valid values:domain-name:value
. Domain name. (Entity type in Cloud SIEM is_domain
.)email-addr:value
. Email address. (Entity type in Cloud SIEM is_email
.)file:hashes
. File hash. (Entity type in Cloud SIEM is_hash
.)file:name
. File name. (Entity type in Cloud SIEM is_file
.)ipv4-addr:value
. IPv4 IP address. (Entity type in Cloud SIEM is_ip
.)ipv6-addr:value
. IPv6 IP address. (Entity type in Cloud SIEM is_ip
.)mac-addr:value
. Mac address name. (Entity type in Cloud SIEM is_mac
.)process:name
. Process name. (Entity type in Cloud SIEM is_process
.)url:value
. URL. (Entity type in Cloud SIEM is_url
.)user-account:user-id
. User ID. (Entity type in Cloud SIEM is_username
.)user-account:login
. Login name. (Entity type in Cloud SIEM is_username
.)
- pattern_type (string). The pattern language used in this indicator (as defined by pattern_type in STIX 2.1). Following are valid values:
- valid_from (string [date-time]). Beginning time this indicator is valid. Timestamp in UTC in RFC3339 format. For example,
2023-03-21T12:00:00.000Z
.