You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
Copy file name to clipboardExpand all lines: docs/cse/administration/create-custom-threat-intel-source.md
+60-21Lines changed: 60 additions & 21 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -10,25 +10,19 @@ import useBaseUrl from '@docusaurus/useBaseUrl';
10
10
11
11
This topic has information about setting up a *custom threat intelligence source* in Cloud SIEM, which is a threat intelligence list that you can populate manually, as opposed to using an automatic feed.
12
12
13
-
You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, hostnames, URLs, email addresses, and file hashes.
13
+
You can set up and populate custom threat intelligence sources interactively from the Cloud SIEM UI, by uploading a .csv file, or using Cloud SIEM APIs. You can populate the sources with IP addresses, domains, URLs, email addresses, and file hashes.
14
14
15
15
## How Cloud SIEM uses indicators
16
16
17
-
When Cloud SIEM encounters an indicator from your threat source in an incoming
18
-
record it adds relevant information to the record. Because threat intelligence
19
-
information is persisted within records, you can reference it downstream
20
-
in both rules and search. The built-in rules that come with Cloud SIEM
21
-
automatically create a signal for records that have been enriched in
22
-
this way.
17
+
When Cloud SIEM encounters an indicator from your threat source in an incoming record it adds relevant information to the record. Because threat intelligence information is persisted within records, you can reference it downstream in both rules and search. The built-in rules that come with Cloud SIEM automatically create a signal for records that have been enriched in this way.
23
18
24
-
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a Rule Tuning Expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence](/docs/cse/rules/about-cse-rules/#threat-intelligence) in the
25
-
*About Cloud SIEM Rules* topic.
19
+
Rule authors can also write rules that look for threat intelligence information in records. To leverage the information in a rule, you can extend your custom rule expression, or add a Rule Tuning Expression to a built-in rule. For a more detailed explanation of how to use threat intelligence information in rules, see [Threat Intelligence](/docs/cse/rules/about-cse-rules/#threat-intelligence) in the *About Cloud SIEM Rules* topic.
26
20
27
21
## Create a threat intelligence source from Cloud SIEM UI
28
22
29
23
1.[**Classic UI**](/docs/get-started/sumo-logic-ui-classic). In the top menu select **Content > Threat Intelligence**. <br/>[**New UI**](/docs/get-started/sumo-logic-ui). In the main Sumo Logic menu, select **Cloud SIEM > Threat Intelligence**. You can also click the **Go To...** menu at the top of the screen and select **Threat Intelligence**.
30
24
1. Click **Add Source** on the **Threat Intelligence** page.
31
-
1.Click **Custom**on the**Add Source** popup.
25
+
1.In the **Custom**box click**Create**.
32
26
1. On the **Add New Source** popup, enter a name, and if desired, a description for the source.
33
27
1. Click **Add Custom Source**.
34
28
@@ -41,13 +35,15 @@ Your new source should now appear on the **Threat Intelligence** page.
41
35
1. On the **Threat Intelligence** page, click the name of the source you want to update.
42
36
1. The **Details** page lists any indicators that have previously been added and have not expired. Click **Add Indicator**.
43
37
1. On the **New Threat Intelligence Indicator** popup.
44
-
1.**Value**. Enter an IP address, hostname, URL, or file hash.
45
-
Your entry must be one of:
46
-
* A valid IPV4 or IPv6 address
47
-
* A valid email address
48
-
* A valid, complete URL
49
-
* A hostname (without protocol or path)
50
-
* A hexadecimal string of 32, 40, 64, or 128 characters
38
+
1.**Value**. Enter one of the following:
39
+
* Domain (valid domain name without protocol or path)
40
+
* Email (valid email address)
41
+
* File hash (hexadecimal string of 32, 40, 64, or 128 characters)
42
+
* IP (valid IPV4 or IPv6 address)
43
+
* URL (valid, complete URL)
44
+
:::note
45
+
For the fields the value will be compared to, see [Target fields for threat indicators](#target-fields-for-threat-indicators) below.
46
+
:::
51
47
1. **Description**. (Optional)
52
48
1. **Expiration**. (Optional) If desired, you can specify an
53
49
expiration date and time for the indicator. When that time is
@@ -58,16 +54,15 @@ Your new source should now appear on the **Threat Intelligence** page.
58
54
59
55
### Upload a file of indicators
60
56
61
-
If you have a large number of indicators to add to your source, you can
62
-
save time by creating a .csv file and uploading it to Cloud SIEM.
57
+
If you have a large number of indicators to add to your source, you can save time by creating a .csv file and uploading it to Cloud SIEM.
63
58
64
59
#### Create a CSV file
65
60
66
61
The .csv file can contain up to four columns, which are described below.
67
62
68
63
| Column | Description |
69
64
| :-- | :-- |
70
-
| value | Required. Must be one of the following: <br/>- A valid IPV4 or IPv6 address<br/>- A valid, complete URL <br/>- A valid email address<br/>- A hostname (without protocol or path)<br/>- A hexadecimal string of 32, 40, 64, or 128 characters|
65
+
| value | Required. Must be one of the following: <br/>- Domain (valid domain name without protocol or path)<br/>- Email (valid email address)<br/>- File hash (hexadecimal string of 32, 40, 64, or 128 characters)<br/>- IP (valid IPV4 or IPv6 address)<br/>- URL (valid, complete URL) <br/>For the fields the value will be compared to, see [Target fields for threat indicators](#target-fields-for-threat-indicators) below.|
71
66
| description | Optional. |
72
67
| expires| Optional. The data and time when you want the indicator to be removed, in any ISO date format. |
73
68
| active | Required. Specifies whether the indicator actively looks for threat intelligence in records. Valid values are `true` or `false`. |
You can use Cloud SIEM threat intelligence APIs to create and manage indicators and custom threat sources. For information about Cloud SIEM APIs and how to access the API documentation, see [Cloud SIEM APIs](/docs/cse/administration/cse-apis/).
93
88
89
+
## Target fields for threat indicators
90
+
91
+
Following are the fields that threat indicators are compared to.
92
+
93
+
* Domain:
94
+
* bro_ntlm_domainname
95
+
* bro_ssl_serverName_rootDomain
96
+
* dns_queryDomain
97
+
* dns_replyDomain
98
+
* fromUser_authDomain
99
+
* http_referrerDomain
100
+
* http_url_rootDomain
101
+
* http_url_fqdn
102
+
* Email:
103
+
* email_sender
104
+
* fromUser_email
105
+
* fromUser_email_raw
106
+
* targetUser_email
107
+
* targetUser_email_raw
108
+
* user_email
109
+
* user_email_raw
110
+
* File hash:
111
+
* file_hash_imphash
112
+
* file_hash_md5
113
+
* file_hash_pehash
114
+
* file_hash_sha1
115
+
* file_hash_sha256
116
+
* file_hash_ssdeep
117
+
* IP:
118
+
* bro_dhcp_assignedIp
119
+
* bro_radius_remoteIp
120
+
* bro_smtp_headers.xOriginatingIp
121
+
* bro_socks_boundIp
122
+
* bro_socks_requestIp
123
+
* device_ip
124
+
* device_natIp
125
+
* dns_replyIp
126
+
* dstDevice_ip
127
+
* dstDevice_natIp
128
+
* srcDevice_ip
129
+
* srcDevice_natIp
130
+
* URL:
131
+
* http_url
132
+
94
133
## Search indicators
95
134
96
135
To search threat indicators, click the **Search All Indicators** button at the top of the **Threat Intelligence** page.
0 commit comments