Skip to content

Commit 207aee6

Browse files
committed
Add file hashes and remove APIs
1 parent 4e4ebf7 commit 207aee6

File tree

2 files changed

+9
-80
lines changed

2 files changed

+9
-80
lines changed

docs/security/threat-intelligence/about-threat-intelligence.md

Lines changed: 0 additions & 1 deletion
Original file line numberDiff line numberDiff line change
@@ -58,7 +58,6 @@ To search logs that contain correlations to threat intelligence indicators, you
5858
* [ZeroFox Threat Intel Source](/docs/send-data/hosted-collectors/cloud-to-cloud-integration-framework/zerofox-intel-source)
5959
* **The API**. See the following APIs in the [Threat Intel Ingest Management](https://api.sumologic.com/docs/#tag/threatIntelIngest) API resource:
6060
* [uploadNormalizedIndicators API](https://api.sumologic.com/docs/#operation/uploadNormalizedIndicators)
61-
* [uploadCsvIndicators API](https://api.sumologic.com/docs/#operation/uploadCsvIndicators)
6261
* [uploadStixIndicators API](https://api.sumologic.com/docs/#operation/uploadStixIndicators)
6362
* **The Threat Intelligence tab**. See [Add indicators in the Threat Intelligence tab](/docs/security/threat-intelligence/threat-intelligence-indicators/#add-indicators-in-the-threat-intelligence-tab).
6463

docs/security/threat-intelligence/upload-formats.md

Lines changed: 9 additions & 79 deletions
Original file line numberDiff line numberDiff line change
@@ -71,6 +71,7 @@ The following attributes are required:
7171
* `domain-name`. Domain name. (Entity type in Cloud SIEM is `_domain`.)
7272
* `email-addr`. Email address. (Entity type in Cloud SIEM is `_email`.)
7373
* `file`. File name. (Entity type in Cloud SIEM is `_file`.)
74+
* `file:hashes`. File hash. (Entity type in Cloud SIEM is `_hash`.)<br/>If you want to add the hash algorithm, enter `file:hashes.'<HASH-TYPE>'`. For example, `[file:hashes.'SHA-256' = '4bac393bdd']`.
7475
* `ipv4-addr`. IPv4 IP address. (Entity type in Cloud SIEM is `_ip`.)
7576
* `ipv6-addr`. IPv6 IP address. (Entity type in Cloud SIEM is `_ip`.)
7677
* `mac-addr`. Mac address name. (Entity type in Cloud SIEM is `_mac`.)
@@ -104,33 +105,18 @@ The following attributes are required:
104105

105106
Comma-separated value (CSV) is a standard format for data upload.
106107

107-
### Example files
108-
109-
#### Upload with the UI
108+
### Example file
110109

111-
If uploading a CSV file with the UI, the format should be the same as used for a standard CSV file:
110+
When uploading a CSV file with the UI, the format should be the same as used for a standard CSV file:
112111

113112
```
114113
0001,192.0.2.0,ipv4-addr:value,TAXII2Source,2023-02-21T12:00:00.00Z,2025-05-21T12:00:00.00Z,30,malicious-activity,,
115114
0002,192.0.2.1,ipv4-addr:value,TAXII2Source,2023-02-21T12:00:00.00Z,2025-05-21T12:00:00.00Z,30,malicious-activity,actor3,reconnaissance
116115
```
117116

118-
#### Upload with the API
119-
120-
If uploading a CSV file using the API, the file should be contained in a JSON object like this:
121-
122-
```
123-
{
124-
"csv": "0001,192.0.2.0,ipv4-addr,TAXII2Source,2023-02-21T12:00:00.00Z,2025-05-21T12:00:00.00Z,3,malicious-activity,,\n
125-
0002,192.0.2.1,ipv4-addr,TAXII2Source,2023-02-21T12:00:00.00Z,2025-05-21T12:00:00.00Z,3,malicious-activity,actor3,reconnaissance\n"
126-
}
127-
```
128-
129-
For other examples for uploading CSV files using the API, see the [uploadCsvIndicators API](https://api.sumologic.com/docs/#operation/uploadCsvIndicators) and the [uploadBlobIndicators API](https://api.sumologic.com/docs/#operation/uploadBlobIndicators).
130-
131117
### Required attributes
132118

133-
For information about the attributes to use, see ["Indicator" in the STIX 2.1 specification](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_muftrcpnf89v), and the [uploadCsvIndicators API](https://api.sumologic.com/docs/#operation/uploadCsvIndicators) in the [Threat Intel Ingest Management](https://api.sumologic.com/docs/#tag/threatIntelIngest) API resource.
119+
For information about the attributes to use, see ["Indicator" in the STIX 2.1 specification](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_muftrcpnf89v).
134120

135121
Columns for the following attributes are required in the upload file:
136122
* **id** (string). ID of the indicator. For example, `indicator--d81f86b9-975b-4c0b-875e-810c5ad45a4f`.
@@ -139,6 +125,7 @@ Columns for the following attributes are required in the upload file:
139125
* `domain-name`. Domain name. (Entity type in Cloud SIEM is `_domain`.)
140126
* `email-addr`. Email address. (Entity type in Cloud SIEM is `_email`.)
141127
* `file`. File name. (Entity type in Cloud SIEM is `_file`.)
128+
* `file:hashes`. File hash. (Entity type in Cloud SIEM is `_hash`.)<br/>If you want to add the hash algorithm, enter `file:hashes.'<HASH-TYPE>'`. For example, `[file:hashes.'SHA-256' = '4bac393bdd']`.
142129
* `ipv4-addr`. IPv4 IP address. (Entity type in Cloud SIEM is `_ip`.)
143130
* `ipv6-addr`. IPv6 IP address. (Entity type in Cloud SIEM is `_ip`.)
144131
* `mac-addr`. Mac address name. (Entity type in Cloud SIEM is `_mac`.)
@@ -195,66 +182,9 @@ Also note that if your STIX file includes lines like these at the top...
195182
```
196183

197184

198-
### Example files
199-
<!--
200-
#### Upload with the UI
201-
202-
Following is an example threat indicator file in STIX 2.1 JSON format if you're uploading a file with the UI.
203-
204-
If you are uploading via the UI, do not include the `source` value in the file, since the UI prompts for the source value when you [add the indicator](/docs/security/threat-intelligence/threat-intelligence-indicators/#add-indicators-in-the-threat-intelligence-tab).
205-
206-
```
207-
[
208-
{
209-
"type": "indicator",
210-
"spec_version": "2.1",
211-
"id": "0001",
212-
"created": "2023-03-21T12:00:00.000Z",
213-
"modified": "2023-03-21T12:00:00.000Z",
214-
"confidence": 30,
215-
"pattern": "[ipv4-addr:value = '192.0.2.0']",
216-
"pattern_type": "stix",
217-
"pattern_version": "string",
218-
"valid_from": "2023-03-21T12:00:00.000Z",
219-
"valid_until": "2025-03-21T12:00:00.000Z",
220-
"indicator_types": [
221-
"malicious-activity"
222-
],
223-
"kill_chain_phases": [
224-
{
225-
"kill_chain_name": "lockheed-martin-cyber-kill-chain",
226-
"phase_name": "reconnaissance"
227-
}
228-
]
229-
},
230-
{
231-
"type": "indicator",
232-
"spec_version": "2.1",
233-
"id": "0002",
234-
"created": "2023-03-21T12:00:00.000Z",
235-
"modified": "2023-03-21T12:00:00.000Z",
236-
"confidence": 30,
237-
"pattern": "[ipv4-addr:value = '192.0.2.1']",
238-
"pattern_type": "stix",
239-
"pattern_version": "string",
240-
"valid_from": "2023-03-21T12:00:00.000Z",
241-
"valid_until": "2025-03-21T12:00:00.000Z",
242-
"indicator_types": [
243-
"malicious-activity"
244-
],
245-
"kill_chain_phases": [
246-
{
247-
"kill_chain_name": "lockheed-martin-cyber-kill-chain",
248-
"phase_name": "reconnaissance"
249-
}
250-
]
251-
}
252-
]
253-
```
185+
### Example file
254186

255-
#### Upload with the API
256-
-->
257-
Following is an example threat indicator file in STIX 2.1 JSON format if you're uploading a file with the API.
187+
Following is an example threat indicator file in STIX 2.1 JSON format when you're uploading a file with the API.
258188

259189
As shown in the following example, if uploading via the API you must add the `source` attribute outside of the indicators object, since the source is not part of the STIX standard. You must also include an `indicators` array field. (For another example for uploading via the API, see the [uploadStixIndicators API](https://api.sumologic.com/docs/#operation/uploadStixIndicators)).
260190

@@ -320,10 +250,10 @@ The following attributes are required:
320250
* **id** (string). ID of the indicator. For example, `indicator--d81f86b9-975b-4c0b-875e-810c5ad45a4f`.
321251
* **created** (string [date-time]). The time at which the object was originally created. Timestamp in UTC in RFC3339 format. For example, `2016-05-01T06:13:14.000Z`.
322252
* **modified** (string [date-time]). When the object is modified. Timestamp in UTC in RFC3339 format. For example, `2023-05-01T06:13:14.000Z`. This property is only used by STIX Objects that support versioning and represents the time that this particular version of the object was last modified.
323-
* **pattern** (string). The pattern of this indicator (as defined by [pattern in STIX 2.1](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_me3pzm77qfnf)). <br/>For example, `[ file:hashes.'SHA-256' = '4bac393bdd' ]`. Following are valid values:
253+
* **pattern** (string). The pattern of this indicator (as defined by [pattern in STIX 2.1](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_me3pzm77qfnf)). Following are valid values:
324254
* `domain-name:value`. Domain name. (Entity type in Cloud SIEM is `_domain`.)
325255
* `email-addr:value`. Email address. (Entity type in Cloud SIEM is `_email`.)
326-
* `file:hashes`. File hash. (Entity type in Cloud SIEM is `_hash`.)
256+
* `file:hashes`. File hash. (Entity type in Cloud SIEM is `_hash`.)<br/>If you want to add the hash algorithm, enter `file:hashes.'<HASH-TYPE>'`. For example, `[file:hashes.'SHA-256' = '4bac393bdd']`.
327257
* `file:name`. File name. (Entity type in Cloud SIEM is `_file`.)
328258
* `ipv4-addr:value`. IPv4 IP address. (Entity type in Cloud SIEM is `_ip`.)
329259
* `ipv6-addr:value`. IPv6 IP address. (Entity type in Cloud SIEM is `_ip`.)

0 commit comments

Comments
 (0)