Skip to content

Commit 17e1d0f

Browse files
authored
DOCS-647 - Add target fields to threat intel article (#4989)
* DOCS-647 - Add target fields to threat intel article * Update docs/cse/administration/create-custom-threat-intel-source.md
1 parent 76867ca commit 17e1d0f

File tree

1 file changed

+60
-21
lines changed

1 file changed

+60
-21
lines changed

docs/cse/administration/create-custom-threat-intel-source.md

Lines changed: 60 additions & 21 deletions
Original file line numberDiff line numberDiff line change
@@ -10,25 +10,19 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
1010

1111
This topic has information about setting up a *custom threat intelligence source* in Cloud SIEM, which is a threat intelligence list that you can populate manually, as opposed to using an automatic feed. 
1212

13-
You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, hostnames, URLs, email addresses, and file hashes.
13+
You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, domains, URLs, email addresses, and file hashes.
1414

1515
## How Cloud SIEM uses indicators
1616

17-
When Cloud SIEM encounters an indicator from your threat source in an incoming
18-
record it adds relevant information to the record. Because threat intelligence
19-
information is persisted within records, you can reference it downstream
20-
in both rules and search. The built-in rules that come with Cloud SIEM
21-
automatically create a signal for records that have been enriched in
22-
this way.
17+
When Cloud SIEM encounters an indicator from your threat source in an incoming record it adds relevant information to the record. Because threat intelligence information is persisted within records, you can reference it downstream in both rules and search. The built-in rules that come with Cloud SIEM automatically create a signal for records that have been enriched in this way.
2318

24-
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a Rule Tuning Expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence](/docs/cse/rules/about-cse-rules/#threat-intelligence) in the
25-
*About Cloud SIEM Rules* topic.
19+
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a Rule Tuning Expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence](/docs/cse/rules/about-cse-rules/#threat-intelligence) in the *About Cloud SIEM Rules* topic.
2620

2721
## Create a threat intelligence source from Cloud SIEM UI
2822

2923
1. [**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
3024
1. Click **Add Source** on the **Threat Intelligence** page.
31-
1. Click **Custom** on the **Add Source** popup.
25+
1. In the **Custom** box click **Create**.
3226
1. On the **Add New Source** popup, enter a name, and if desired, a description for the source.
3327
1. Click **Add Custom Source**.
3428

@@ -41,13 +35,15 @@ Your new source should now appear on the **Threat Intelligence** page.
4135
1. On the **Threat Intelligence** page, click the name of the source you want to update.
4236
1. The **Details** page lists any indicators that have previously been added and have not expired. Click **Add Indicator**.
4337
1. On the **New Threat Intelligence Indicator** popup.
44-
1. **Value**. Enter an IP address, hostname, URL, or file hash.
45-
Your entry must be one of:
46-
* A valid IPV4 or IPv6 address  
47-
* A valid email address
48-
* A valid, complete URL
49-
* A hostname (without protocol or path)
50-
* A hexadecimal string of 32, 40, 64, or 128 characters 
38+
1. **Value**. Enter one of the following:
39+
* Domain (valid domain name without protocol or path)
40+
* Email (valid email address)
41+
* File hash (hexadecimal string of 32, 40, 64, or 128 characters)
42+
* IP (valid IPV4 or IPv6 address)  
43+
* URL (valid, complete URL)
44+
:::note
45+
For the fields the value will be compared to, see [Target fields for threat indicators](#target-fields-for-threat-indicators) below.
46+
:::
5147
1. **Description**. (Optional)
5248
1. **Expiration**. (Optional) If desired, you can specify an
5349
expiration date and time for the indicator. When that time is
@@ -58,16 +54,15 @@ Your new source should now appear on the **Threat Intelligence** page.
5854

5955
### Upload a file of indicators 
6056

61-
If you have a large number of indicators to add to your source, you can
62-
save time by creating a .csv file and uploading it to Cloud SIEM.
57+
If you have a large number of indicators to add to your source, you can save time by creating a .csv file and uploading it to Cloud SIEM.
6358

6459
#### Create a CSV file
6560

6661
The .csv file can contain up to four columns, which are described below. 
6762

6863
| Column | Description |
6964
| :-- | :-- |
70-
| value | Required. Must be one of the following: <br/>- A valid IPV4 or IPv6 address<br/>- A valid, complete URL <br/>- A valid email address<br/>- A hostname (without protocol or path)<br/>- A hexadecimal string of 32, 40, 64, or 128 characters |
65+
| value | Required. Must be one of the following: <br/>- Domain (valid domain name without protocol or path)<br/>- Email (valid email address)<br/>- File hash (hexadecimal string of 32, 40, 64, or 128 characters)<br/>- IP (valid IPV4 or IPv6 address)<br/>- URL (valid, complete URL) <br/>For the fields the value will be compared to, see [Target fields for threat indicators](#target-fields-for-threat-indicators) below. |
7166
| description | Optional. |
7267
| expires| Optional. The data and time when you want the indicator to be removed, in any ISO date format. |
7368
| active | Required. Specifies whether the indicator actively looks for threat intelligence in records. Valid values are `true` or `false`. |
@@ -79,7 +74,7 @@ value,description,expires,active
7974
22.333.22.252,Tante Intel,2022-06-01 01:00 PM,true
8075
```
8176

82-
### Upload the file
77+
#### Upload the file
8378

8479
1. On the **Threat Intelligence** page, click the name of the target custom source.
8580
1. Click **Import Indicators**.
@@ -91,6 +86,50 @@ value,description,expires,active
9186

9287
You can use Cloud SIEM threat intelligence APIs to create and manage indicators and custom threat sources. For information about Cloud SIEM APIs and how to access the API documentation, see [Cloud SIEM APIs](/docs/cse/administration/cse-apis/).
9388

89+
## Target fields for threat indicators
90+
91+
Following are the fields that threat indicators are compared to.
92+
93+
* Domain:
94+
* bro_ntlm_domainname
95+
* bro_ssl_serverName_rootDomain
96+
* dns_queryDomain
97+
* dns_replyDomain
98+
* fromUser_authDomain
99+
* http_referrerDomain
100+
* http_url_rootDomain
101+
* http_url_fqdn
102+
* Email:
103+
* email_sender
104+
* fromUser_email
105+
* fromUser_email_raw
106+
* targetUser_email
107+
* targetUser_email_raw
108+
* user_email
109+
* user_email_raw
110+
* File hash:
111+
* file_hash_imphash
112+
* file_hash_md5
113+
* file_hash_pehash
114+
* file_hash_sha1
115+
* file_hash_sha256
116+
* file_hash_ssdeep
117+
* IP:
118+
* bro_dhcp_assignedIp
119+
* bro_radius_remoteIp
120+
* bro_smtp_headers.xOriginatingIp
121+
* bro_socks_boundIp
122+
* bro_socks_requestIp
123+
* device_ip
124+
* device_natIp
125+
* dns_replyIp
126+
* dstDevice_ip
127+
* dstDevice_natIp
128+
* srcDevice_ip
129+
* srcDevice_natIp
130+
* URL:
131+
* http_url
132+
94133
## Search indicators
95134

96135
To search threat indicators, click the **Search All Indicators** button at the top of the **Threat Intelligence** page.

0 commit comments

Comments
 (0)