Skip to content

Commit 6f77c18

Browse files
authored
Update per Mike Pomraning comments (#4983)
1 parent a8a71c7 commit 6f77c18

File tree

1 file changed

+11
-11
lines changed

1 file changed

+11
-11
lines changed

docs/platform-services/threat-intelligence-indicators.md

Lines changed: 11 additions & 11 deletions
Original file line numberDiff line numberDiff line change
@@ -172,7 +172,7 @@ Where:
172172
If there's still a tie at this point, the system picks the indicator the back-end database returned first.
173173

174174
* `source` is the source to search for the threat intelligence indicator. If `source` is not specified, all sources are searched.
175-
* `include` includes either all, only active, or only expired threat intelligence indicators. If `include` is not specified, all matching indicators are returned.
175+
* `include` includes either all, only active, or only expired threat intelligence indicators. If `include` is not specified, only active matching indicators are returned.
176176
* `<indicator_value_field>` is the indicator to look up.
177177
* `<optional_indicator_value_field>` is used to add more indicators to look up.
178178

@@ -267,7 +267,7 @@ Parameters:
267267
* `hasThreatMatch([srcDevice_ip])`
268268
* `hasThreatMatch([srcDevice_ip, dstDevice_ip])`
269269
* `hasThreatMatch([srcDevice_ip], confidence > 50)`
270-
* `hasThreatMatch([srcDevice_ip], confidence > 50 AND source="FreeTAXII")`
270+
* `hasThreatMatch([srcDevice_ip], confidence > 50 AND source="TAXII2Source")`
271271
* `hasThreatMatch([srcDevice_ip], source="s1" OR (source="s2" confidence > 50 AND))`
272272
* `hasThreatMatch([srcDevice_ip], expired_indicators)`
273273
* `hasThreatMatch([srcDevice_ip], confidence > 50, all_indicators)`
@@ -327,7 +327,7 @@ Following is an example threat indicator file in normalized JSON format. (For an
327327
"id": "0001",
328328
"indicator": "192.0.2.0",
329329
"type": "ipv4-addr:value",
330-
"source": "FreeTAXII",
330+
"source": "TAXII2Source",
331331
"validFrom": "2023-03-21T12:00:00.000Z",
332332
"validUntil": "2025-03-21T12:00:00.000Z",
333333
"confidence": 30,
@@ -343,7 +343,7 @@ Following is an example threat indicator file in normalized JSON format. (For an
343343
"id": "0002",
344344
"indicator": "192.0.2.1",
345345
"type": "ipv4-addr:value",
346-
"source": "FreeTAXII",
346+
"source": "TAXII2Source",
347347
"validFrom": "2023-03-21T12:00:00.000Z",
348348
"validUntil": "2025-03-21T12:00:00.000Z",
349349
"confidence": 30,
@@ -376,7 +376,7 @@ The following attributes are required:
376376
* `process`. Process name. (Entity type in Cloud SIEM is `_process`.)
377377
* `url`. URL. (Entity type in Cloud SIEM is `_url`.)
378378
* `user-account`. User ID. (Entity type in Cloud SIEM is `_username`.)
379-
* **source** (string). User-provided text to identify the source of the indicator. For example, `FreeTAXII`.
379+
* **source** (string). User-provided text to identify the source of the indicator. For example, `TAXII2Source`.
380380
* **validFrom** (string [date-time]). Beginning time this indicator is valid. Timestamp in UTC in RFC3339 format. For example, `2023-03-21T12:00:00.000Z`.
381381
* **confidence** (integer [ 1 .. 100 ]). Confidence that the creator has in the correctness of their data, where 100 is highest (as [defined by the confidence scale in STIX 2.1](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_1v6elyto0uqg)). For example, `75`.
382382
* **threatType** (string). Type of indicator (as [defined by indicator_types in STIX 2.1](https://docs.oasis-open.org/cti/stix/v2.1/os/stix-v2.1-os.html#_cvhfwe3t9vuo)). For example, `malicious-activity`. (This attribute can result in a special label appearing next to Entities in the Cloud SIEM UI. See [Threat indicators in the Cloud SIEM UI](#view-threat-indicators-in-the-cloud-siem-ui).) <br/>Following are valid values:
@@ -410,8 +410,8 @@ Comma-separated value (CSV) is a standard format for data upload.
410410
If uploading a CSV file with the UI, the format should be the same as used for a standard CSV file:
411411

412412
```
413-
0001,192.0.2.0,ipv4-addr:value,FreeTAXII,2023-02-21T12:00:00.00Z,2025-05-21T12:00:00.00Z,30,malicious-activity,,
414-
0002,192.0.2.1,ipv4-addr:value,FreeTAXII,2023-02-21T12:00:00.00Z,2025-05-21T12:00:00.00Z,30,malicious-activity,actor3,reconnaissance
413+
0001,192.0.2.0,ipv4-addr:value,TAXII2Source,2023-02-21T12:00:00.00Z,2025-05-21T12:00:00.00Z,30,malicious-activity,,
414+
0002,192.0.2.1,ipv4-addr:value,TAXII2Source,2023-02-21T12:00:00.00Z,2025-05-21T12:00:00.00Z,30,malicious-activity,actor3,reconnaissance
415415
```
416416

417417
##### Upload with the API
@@ -420,8 +420,8 @@ If uploading a CSV file using the API, the file should be contained in a JSON ob
420420

421421
```
422422
{
423-
"csv": "0001,192.0.2.0,ipv4-addr,FreeTAXII,2023-02-21T12:00:00.00Z,2025-05-21T12:00:00.00Z,3,malicious-activity,,\n
424-
0002,192.0.2.1,ipv4-addr,FreeTAXII,2023-02-21T12:00:00.00Z,2025-05-21T12:00:00.00Z,3,malicious-activity,actor3,reconnaissance\n"
423+
"csv": "0001,192.0.2.0,ipv4-addr,TAXII2Source,2023-02-21T12:00:00.00Z,2025-05-21T12:00:00.00Z,3,malicious-activity,,\n
424+
0002,192.0.2.1,ipv4-addr,TAXII2Source,2023-02-21T12:00:00.00Z,2025-05-21T12:00:00.00Z,3,malicious-activity,actor3,reconnaissance\n"
425425
}
426426
```
427427

@@ -444,7 +444,7 @@ Columns for the following attributes are required in the upload file:
444444
* `process`. Process name. (Entity type in Cloud SIEM is `_process`.)
445445
* `url`. URL. (Entity type in Cloud SIEM is `_url`.)
446446
* `user-account`. User ID. (Entity type in Cloud SIEM is `_username`.)
447-
* **source** (string). User-provided text to identify the source of the indicator. For example, `FreeTAXII`.
447+
* **source** (string). User-provided text to identify the source of the indicator. For example, `TAXII2Source`.
448448
* **validFrom** (string [date-time]). Beginning time this indicator is valid. Timestamp in UTC in RFC3339 format. For example, `2023-03-21T12:00:00.000Z`.
449449
* **validUntil** (string [date-time]). Ending time this indicator is valid. If not set, the indicator never expires. Timestamp in UTC in RFC3339 format. For example, `2024-03-21T12:00:00.000Z`.
450450
* **confidence** (integer [ 1 .. 100 ]). Confidence that the creator has in the correctness of their data, where 100 is highest. For example, `75`.
@@ -559,7 +559,7 @@ As shown in the following example, if uploading via the API you must add the `so
559559

560560
```
561561
{
562-
"source": "FreeTAXII",
562+
"source": "TAXII 2 Source",
563563
"indicators": [
564564
{
565565
"type": "indicator",

0 commit comments

Comments
 (0)