You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
***The Threat Intelligence tab**. See [Add indicators in the Threat Intelligence tab](/docs/security/threat-intelligence/threat-intelligence-indicators/#add-indicators-in-the-threat-intelligence-tab).
Copy file name to clipboardExpand all lines: docs/security/threat-intelligence/upload-formats.md
+9-79Lines changed: 9 additions & 79 deletions
Display the source diff
Display the rich diff
Original file line number
Diff line number
Diff line change
@@ -71,6 +71,7 @@ The following attributes are required:
71
71
* `domain-name`. Domain name. (Entity type in Cloud SIEM is `_domain`.)
72
72
* `email-addr`. Email address. (Entity type in Cloud SIEM is `_email`.)
73
73
* `file`. File name. (Entity type in Cloud SIEM is `_file`.)
74
+
* `file:hashes`. File hash. (Entity type in Cloud SIEM is `_hash`.)<br/>If you want to add the hash algorithm, enter `file:hashes.'<HASH-TYPE>'`. For example, `[file:hashes.'SHA-256' = '4bac393bdd']`.
74
75
* `ipv4-addr`. IPv4 IP address. (Entity type in Cloud SIEM is `_ip`.)
75
76
* `ipv6-addr`. IPv6 IP address. (Entity type in Cloud SIEM is `_ip`.)
76
77
* `mac-addr`. Mac address name. (Entity type in Cloud SIEM is `_mac`.)
@@ -104,33 +105,18 @@ The following attributes are required:
104
105
105
106
Comma-separated value (CSV) is a standard format for data upload.
106
107
107
-
### Example files
108
-
109
-
#### Upload with the UI
108
+
### Example file
110
109
111
-
If uploading a CSV file with the UI, the format should be the same as used for a standard CSV file:
110
+
When uploading a CSV file with the UI, the format should be the same as used for a standard CSV file:
For other examples for uploading CSV files using the API, see the [uploadCsvIndicators API](https://api.sumologic.com/docs/#operation/uploadCsvIndicators) and the [uploadBlobIndicators API](https://api.sumologic.com/docs/#operation/uploadBlobIndicators).
130
-
131
117
### Required attributes
132
118
133
-
For information about the attributes to use, see ["Indicator" in the STIX 2.1 specification](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_muftrcpnf89v), and the [uploadCsvIndicators API](https://api.sumologic.com/docs/#operation/uploadCsvIndicators) in the [Threat Intel Ingest Management](https://api.sumologic.com/docs/#tag/threatIntelIngest) API resource.
119
+
For information about the attributes to use, see ["Indicator" in the STIX 2.1 specification](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_muftrcpnf89v).
134
120
135
121
Columns for the following attributes are required in the upload file:
136
122
* **id** (string). ID of the indicator. For example, `indicator--d81f86b9-975b-4c0b-875e-810c5ad45a4f`.
@@ -139,6 +125,7 @@ Columns for the following attributes are required in the upload file:
139
125
* `domain-name`. Domain name. (Entity type in Cloud SIEM is `_domain`.)
140
126
* `email-addr`. Email address. (Entity type in Cloud SIEM is `_email`.)
141
127
* `file`. File name. (Entity type in Cloud SIEM is `_file`.)
128
+
* `file:hashes`. File hash. (Entity type in Cloud SIEM is `_hash`.)<br/>If you want to add the hash algorithm, enter `file:hashes.'<HASH-TYPE>'`. For example, `[file:hashes.'SHA-256' = '4bac393bdd']`.
142
129
* `ipv4-addr`. IPv4 IP address. (Entity type in Cloud SIEM is `_ip`.)
143
130
* `ipv6-addr`. IPv6 IP address. (Entity type in Cloud SIEM is `_ip`.)
144
131
* `mac-addr`. Mac address name. (Entity type in Cloud SIEM is `_mac`.)
@@ -195,66 +182,9 @@ Also note that if your STIX file includes lines like these at the top...
195
182
```
196
183
197
184
198
-
### Example files
199
-
<!--
200
-
#### Upload with the UI
201
-
202
-
Following is an example threat indicator file in STIX 2.1 JSON format if you're uploading a file with the UI.
203
-
204
-
If you are uploading via the UI, do not include the `source` value in the file, since the UI prompts for the source value when you [add the indicator](/docs/security/threat-intelligence/threat-intelligence-indicators/#add-indicators-in-the-threat-intelligence-tab).
Following is an example threat indicator file in STIX 2.1 JSON format if you're uploading a file with the API.
187
+
Following is an example threat indicator file in STIX 2.1 JSON format when you're uploading a file with the API.
258
188
259
189
As shown in the following example, if uploading via the API you must add the `source` attribute outside of the indicators object, since the source is not part of the STIX standard. You must also include an `indicators` array field. (For another example for uploading via the API, see the [uploadStixIndicators API](https://api.sumologic.com/docs/#operation/uploadStixIndicators)).
260
190
@@ -320,10 +250,10 @@ The following attributes are required:
320
250
* **id** (string). ID of the indicator. For example, `indicator--d81f86b9-975b-4c0b-875e-810c5ad45a4f`.
321
251
* **created** (string [date-time]). The time at which the object was originally created. Timestamp in UTC in RFC3339 format. For example, `2016-05-01T06:13:14.000Z`.
322
252
* **modified** (string [date-time]). When the object is modified. Timestamp in UTC in RFC3339 format. For example, `2023-05-01T06:13:14.000Z`. This property is only used by STIX Objects that support versioning and represents the time that this particular version of the object was last modified.
323
-
* **pattern** (string). The pattern of this indicator (as defined by [pattern in STIX 2.1](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_me3pzm77qfnf)). <br/>For example, `[ file:hashes.'SHA-256' = '4bac393bdd' ]`. Following are valid values:
253
+
* **pattern** (string). The pattern of this indicator (as defined by [pattern in STIX 2.1](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_me3pzm77qfnf)). Following are valid values:
324
254
* `domain-name:value`. Domain name. (Entity type in Cloud SIEM is `_domain`.)
325
255
* `email-addr:value`. Email address. (Entity type in Cloud SIEM is `_email`.)
326
-
* `file:hashes`. File hash. (Entity type in Cloud SIEM is `_hash`.)
256
+
* `file:hashes`. File hash. (Entity type in Cloud SIEM is `_hash`.)<br/>If you want to add the hash algorithm, enter `file:hashes.'<HASH-TYPE>'`. For example, `[file:hashes.'SHA-256' = '4bac393bdd']`.
327
257
* `file:name`. File name. (Entity type in Cloud SIEM is `_file`.)
328
258
* `ipv4-addr:value`. IPv4 IP address. (Entity type in Cloud SIEM is `_ip`.)
329
259
* `ipv6-addr:value`. IPv6 IP address. (Entity type in Cloud SIEM is `_ip`.)
0 commit comments